Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-47352 (GCVE-0-2021-47352)
Vulnerability from cvelistv5 – Published: 2024-05-21 14:35 – Updated: 2025-12-18 11:37
VLAI?
EPSS
Title
virtio-net: Add validation for used length
Summary
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: Add validation for used length
This adds validation for used length (might come
from an untrusted device) to avoid data corruption
or loss.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
f6b10209b90d48a84f886ab2b317b5d2cbfe3143 , < c1b40d1959517ff2ea473d40eeab4691d6d62462
(git)
Affected: f6b10209b90d48a84f886ab2b317b5d2cbfe3143 , < c92298d228f61589dd21657af2bea95fc866b813 (git) Affected: f6b10209b90d48a84f886ab2b317b5d2cbfe3143 , < 3133e01514c3c498f2b01ff210ee6134b70c663c (git) Affected: f6b10209b90d48a84f886ab2b317b5d2cbfe3143 , < ba710baa1cc1b17a0483f7befe03e696efd17292 (git) Affected: f6b10209b90d48a84f886ab2b317b5d2cbfe3143 , < ad993a95c508417acdeb15244109e009e50d8758 (git) |
||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:32:08.505Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-47352",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T15:38:39.694535Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T17:33:48.464Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/virtio_net.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "c1b40d1959517ff2ea473d40eeab4691d6d62462",
"status": "affected",
"version": "f6b10209b90d48a84f886ab2b317b5d2cbfe3143",
"versionType": "git"
},
{
"lessThan": "c92298d228f61589dd21657af2bea95fc866b813",
"status": "affected",
"version": "f6b10209b90d48a84f886ab2b317b5d2cbfe3143",
"versionType": "git"
},
{
"lessThan": "3133e01514c3c498f2b01ff210ee6134b70c663c",
"status": "affected",
"version": "f6b10209b90d48a84f886ab2b317b5d2cbfe3143",
"versionType": "git"
},
{
"lessThan": "ba710baa1cc1b17a0483f7befe03e696efd17292",
"status": "affected",
"version": "f6b10209b90d48a84f886ab2b317b5d2cbfe3143",
"versionType": "git"
},
{
"lessThan": "ad993a95c508417acdeb15244109e009e50d8758",
"status": "affected",
"version": "f6b10209b90d48a84f886ab2b317b5d2cbfe3143",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/virtio_net.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.11"
},
{
"lessThan": "4.11",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.293",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.51",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"version": "5.12.18",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"version": "5.13.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.14",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.293",
"versionStartIncluding": "4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.51",
"versionStartIncluding": "4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.12.18",
"versionStartIncluding": "4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.13.3",
"versionStartIncluding": "4.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.14",
"versionStartIncluding": "4.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T11:37:05.837Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462"
},
{
"url": "https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813"
},
{
"url": "https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c"
},
{
"url": "https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292"
},
{
"url": "https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758"
}
],
"title": "virtio-net: Add validation for used length",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2021-47352",
"datePublished": "2024-05-21T14:35:56.473Z",
"dateReserved": "2024-05-21T14:28:16.985Z",
"dateUpdated": "2025-12-18T11:37:05.837Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-net: Add validation for used length\\n\\nThis adds validation for used length (might come\\nfrom an untrusted device) to avoid data corruption\\nor loss.\"}, {\"lang\": \"es\", \"value\": \" En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: virtio-net: Agregar validaci\\u00f3n para la longitud utilizada. Esto agrega validaci\\u00f3n para la longitud utilizada (puede provenir de un dispositivo que no es de confianza) para evitar la corrupci\\u00f3n o p\\u00e9rdida de datos.\"}]",
"id": "CVE-2021-47352",
"lastModified": "2024-11-21T06:35:56.973",
"published": "2024-05-21T15:15:21.620",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-47352\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-21T15:15:21.620\",\"lastModified\":\"2025-11-14T17:22:04.850\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-net: Add validation for used length\\n\\nThis adds validation for used length (might come\\nfrom an untrusted device) to avoid data corruption\\nor loss.\"},{\"lang\":\"es\",\"value\":\" En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: virtio-net: Agregar validaci\u00f3n para la longitud utilizada. Esto agrega validaci\u00f3n para la longitud utilizada (puede provenir de un dispositivo que no es de confianza) para evitar la corrupci\u00f3n o p\u00e9rdida de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.4.293\",\"matchCriteriaId\":\"389EB980-4648-446E-A0DC-5FB0265E0F02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.51\",\"matchCriteriaId\":\"93289127-DFB3-4515-89DD-50521FF8B7FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.18\",\"matchCriteriaId\":\"79D13C82-E06F-4A70-A3D1-C09494FBC94D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13\",\"versionEndExcluding\":\"5.13.3\",\"matchCriteriaId\":\"853187F6-707A-487B-95C0-621B5211B43C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:32:08.505Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47352\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:38:39.694535Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:18.851Z\"}}], \"cna\": {\"title\": \"virtio-net: Add validation for used length\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"f6b10209b90d48a84f886ab2b317b5d2cbfe3143\", \"lessThan\": \"c1b40d1959517ff2ea473d40eeab4691d6d62462\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f6b10209b90d48a84f886ab2b317b5d2cbfe3143\", \"lessThan\": \"c92298d228f61589dd21657af2bea95fc866b813\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f6b10209b90d48a84f886ab2b317b5d2cbfe3143\", \"lessThan\": \"3133e01514c3c498f2b01ff210ee6134b70c663c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f6b10209b90d48a84f886ab2b317b5d2cbfe3143\", \"lessThan\": \"ba710baa1cc1b17a0483f7befe03e696efd17292\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f6b10209b90d48a84f886ab2b317b5d2cbfe3143\", \"lessThan\": \"ad993a95c508417acdeb15244109e009e50d8758\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/virtio_net.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.293\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.51\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.18\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.13.*\"}, {\"status\": \"unaffected\", \"version\": \"5.14\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/virtio_net.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462\"}, {\"url\": \"https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813\"}, {\"url\": \"https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c\"}, {\"url\": \"https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292\"}, {\"url\": \"https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-net: Add validation for used length\\n\\nThis adds validation for used length (might come\\nfrom an untrusted device) to avoid data corruption\\nor loss.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.293\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.51\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.18\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13.3\", \"versionStartIncluding\": \"4.11\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.14\", \"versionStartIncluding\": \"4.11\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-12-18T11:37:05.837Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-47352\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-18T11:37:05.837Z\", \"dateReserved\": \"2024-05-21T14:28:16.985Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T14:35:56.473Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2024:1983-1
Vulnerability from csaf_suse - Published: 2024-06-11 10:56 - Updated: 2024-06-11 10:56Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2022-48697: Fix a use-after-free (bsc#1223922).
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)
- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47423: Fix file release memory leak (bsc#1225366).
- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2021-47401: Fix stack information leak (bsc#1225242).
- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2023-52864: Fix opening of char device (bsc#1225132).
- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).
- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
- CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752).
- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)
- CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
- CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-27008: Fix out of bounds access (bsc#1223802).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Disable passing console lock owner completely during panic() (bsc#1197894).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tls: Fix context leak on tls_device_down (bsc#1221545).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
Patchnames
SUSE-2024-1983,SUSE-SLE-RT-12-SP5-2024-1983
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2022-48697: Fix a use-after-free (bsc#1223922).\n- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)\n- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)\n- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)\n- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2021-47423: Fix file release memory leak (bsc#1225366).\n- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2024-35932: Do not check if plane-\u003estate-\u003efb == state-\u003efb (bsc#1224650).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).\n- CVE-2024-35791: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2021-47401: Fix stack information leak (bsc#1225242).\n- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).\n- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2023-52864: Fix opening of char device (bsc#1225132).\n- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)\n- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).\n- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).\n- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)\n- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)\n- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).\n- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).\n- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).\n- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).\n- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).\n- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).\n- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).\n- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).\n- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2024-26900: Fixed kmemleak of rdev-\u003eserial (bsc#1223046).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752).\n- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)\n- CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).\n- CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).\n- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).\n- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)\n- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).\n- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2024-27008: Fix out of bounds access (bsc#1223802).\n- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: sr9700: stop lying about skb-\u003etruesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- printk: Disable passing console lock owner completely during panic() (bsc#1197894).\n- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call-\u003euser_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tls: Fix context leak on tls_device_down (bsc#1221545).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).\n- usb: aqc111: stop lying about skb-\u003etruesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1983,SUSE-SLE-RT-12-SP5-2024-1983",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1983-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1983-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241983-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1983-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1141539",
"url": "https://bugzilla.suse.com/1141539"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1185902",
"url": "https://bugzilla.suse.com/1185902"
},
{
"category": "self",
"summary": "SUSE Bug 1187716",
"url": "https://bugzilla.suse.com/1187716"
},
{
"category": "self",
"summary": "SUSE Bug 1188616",
"url": "https://bugzilla.suse.com/1188616"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191452",
"url": "https://bugzilla.suse.com/1191452"
},
{
"category": "self",
"summary": "SUSE Bug 1194591",
"url": "https://bugzilla.suse.com/1194591"
},
{
"category": "self",
"summary": "SUSE Bug 1197760",
"url": "https://bugzilla.suse.com/1197760"
},
{
"category": "self",
"summary": "SUSE Bug 1197894",
"url": "https://bugzilla.suse.com/1197894"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1206213",
"url": "https://bugzilla.suse.com/1206213"
},
{
"category": "self",
"summary": "SUSE Bug 1206646",
"url": "https://bugzilla.suse.com/1206646"
},
{
"category": "self",
"summary": "SUSE Bug 1207186",
"url": "https://bugzilla.suse.com/1207186"
},
{
"category": "self",
"summary": "SUSE Bug 1209657",
"url": "https://bugzilla.suse.com/1209657"
},
{
"category": "self",
"summary": "SUSE Bug 1210335",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "self",
"summary": "SUSE Bug 1215702",
"url": "https://bugzilla.suse.com/1215702"
},
{
"category": "self",
"summary": "SUSE Bug 1216702",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "self",
"summary": "SUSE Bug 1217169",
"url": "https://bugzilla.suse.com/1217169"
},
{
"category": "self",
"summary": "SUSE Bug 1217519",
"url": "https://bugzilla.suse.com/1217519"
},
{
"category": "self",
"summary": "SUSE Bug 1218917",
"url": "https://bugzilla.suse.com/1218917"
},
{
"category": "self",
"summary": "SUSE Bug 1220487",
"url": "https://bugzilla.suse.com/1220487"
},
{
"category": "self",
"summary": "SUSE Bug 1220513",
"url": "https://bugzilla.suse.com/1220513"
},
{
"category": "self",
"summary": "SUSE Bug 1220854",
"url": "https://bugzilla.suse.com/1220854"
},
{
"category": "self",
"summary": "SUSE Bug 1220928",
"url": "https://bugzilla.suse.com/1220928"
},
{
"category": "self",
"summary": "SUSE Bug 1221044",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "self",
"summary": "SUSE Bug 1221081",
"url": "https://bugzilla.suse.com/1221081"
},
{
"category": "self",
"summary": "SUSE Bug 1221086",
"url": "https://bugzilla.suse.com/1221086"
},
{
"category": "self",
"summary": "SUSE Bug 1221543",
"url": "https://bugzilla.suse.com/1221543"
},
{
"category": "self",
"summary": "SUSE Bug 1221545",
"url": "https://bugzilla.suse.com/1221545"
},
{
"category": "self",
"summary": "SUSE Bug 1221816",
"url": "https://bugzilla.suse.com/1221816"
},
{
"category": "self",
"summary": "SUSE Bug 1221977",
"url": "https://bugzilla.suse.com/1221977"
},
{
"category": "self",
"summary": "SUSE Bug 1221994",
"url": "https://bugzilla.suse.com/1221994"
},
{
"category": "self",
"summary": "SUSE Bug 1222559",
"url": "https://bugzilla.suse.com/1222559"
},
{
"category": "self",
"summary": "SUSE Bug 1222619",
"url": "https://bugzilla.suse.com/1222619"
},
{
"category": "self",
"summary": "SUSE Bug 1222627",
"url": "https://bugzilla.suse.com/1222627"
},
{
"category": "self",
"summary": "SUSE Bug 1222667",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "self",
"summary": "SUSE Bug 1222671",
"url": "https://bugzilla.suse.com/1222671"
},
{
"category": "self",
"summary": "SUSE Bug 1222793",
"url": "https://bugzilla.suse.com/1222793"
},
{
"category": "self",
"summary": "SUSE Bug 1222893",
"url": "https://bugzilla.suse.com/1222893"
},
{
"category": "self",
"summary": "SUSE Bug 1222894",
"url": "https://bugzilla.suse.com/1222894"
},
{
"category": "self",
"summary": "SUSE Bug 1223023",
"url": "https://bugzilla.suse.com/1223023"
},
{
"category": "self",
"summary": "SUSE Bug 1223046",
"url": "https://bugzilla.suse.com/1223046"
},
{
"category": "self",
"summary": "SUSE Bug 1223048",
"url": "https://bugzilla.suse.com/1223048"
},
{
"category": "self",
"summary": "SUSE Bug 1223084",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "self",
"summary": "SUSE Bug 1223119",
"url": "https://bugzilla.suse.com/1223119"
},
{
"category": "self",
"summary": "SUSE Bug 1223138",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "self",
"summary": "SUSE Bug 1223207",
"url": "https://bugzilla.suse.com/1223207"
},
{
"category": "self",
"summary": "SUSE Bug 1223360",
"url": "https://bugzilla.suse.com/1223360"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1223432",
"url": "https://bugzilla.suse.com/1223432"
},
{
"category": "self",
"summary": "SUSE Bug 1223509",
"url": "https://bugzilla.suse.com/1223509"
},
{
"category": "self",
"summary": "SUSE Bug 1223512",
"url": "https://bugzilla.suse.com/1223512"
},
{
"category": "self",
"summary": "SUSE Bug 1223539",
"url": "https://bugzilla.suse.com/1223539"
},
{
"category": "self",
"summary": "SUSE Bug 1223540",
"url": "https://bugzilla.suse.com/1223540"
},
{
"category": "self",
"summary": "SUSE Bug 1223626",
"url": "https://bugzilla.suse.com/1223626"
},
{
"category": "self",
"summary": "SUSE Bug 1223627",
"url": "https://bugzilla.suse.com/1223627"
},
{
"category": "self",
"summary": "SUSE Bug 1223633",
"url": "https://bugzilla.suse.com/1223633"
},
{
"category": "self",
"summary": "SUSE Bug 1223653",
"url": "https://bugzilla.suse.com/1223653"
},
{
"category": "self",
"summary": "SUSE Bug 1223666",
"url": "https://bugzilla.suse.com/1223666"
},
{
"category": "self",
"summary": "SUSE Bug 1223671",
"url": "https://bugzilla.suse.com/1223671"
},
{
"category": "self",
"summary": "SUSE Bug 1223712",
"url": "https://bugzilla.suse.com/1223712"
},
{
"category": "self",
"summary": "SUSE Bug 1223715",
"url": "https://bugzilla.suse.com/1223715"
},
{
"category": "self",
"summary": "SUSE Bug 1223738",
"url": "https://bugzilla.suse.com/1223738"
},
{
"category": "self",
"summary": "SUSE Bug 1223744",
"url": "https://bugzilla.suse.com/1223744"
},
{
"category": "self",
"summary": "SUSE Bug 1223752",
"url": "https://bugzilla.suse.com/1223752"
},
{
"category": "self",
"summary": "SUSE Bug 1223802",
"url": "https://bugzilla.suse.com/1223802"
},
{
"category": "self",
"summary": "SUSE Bug 1223819",
"url": "https://bugzilla.suse.com/1223819"
},
{
"category": "self",
"summary": "SUSE Bug 1223834",
"url": "https://bugzilla.suse.com/1223834"
},
{
"category": "self",
"summary": "SUSE Bug 1223922",
"url": "https://bugzilla.suse.com/1223922"
},
{
"category": "self",
"summary": "SUSE Bug 1223923",
"url": "https://bugzilla.suse.com/1223923"
},
{
"category": "self",
"summary": "SUSE Bug 1223931",
"url": "https://bugzilla.suse.com/1223931"
},
{
"category": "self",
"summary": "SUSE Bug 1223932",
"url": "https://bugzilla.suse.com/1223932"
},
{
"category": "self",
"summary": "SUSE Bug 1223948",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "self",
"summary": "SUSE Bug 1223969",
"url": "https://bugzilla.suse.com/1223969"
},
{
"category": "self",
"summary": "SUSE Bug 1224096",
"url": "https://bugzilla.suse.com/1224096"
},
{
"category": "self",
"summary": "SUSE Bug 1224174",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "self",
"summary": "SUSE Bug 1224181",
"url": "https://bugzilla.suse.com/1224181"
},
{
"category": "self",
"summary": "SUSE Bug 1224347",
"url": "https://bugzilla.suse.com/1224347"
},
{
"category": "self",
"summary": "SUSE Bug 1224482",
"url": "https://bugzilla.suse.com/1224482"
},
{
"category": "self",
"summary": "SUSE Bug 1224511",
"url": "https://bugzilla.suse.com/1224511"
},
{
"category": "self",
"summary": "SUSE Bug 1224525",
"url": "https://bugzilla.suse.com/1224525"
},
{
"category": "self",
"summary": "SUSE Bug 1224566",
"url": "https://bugzilla.suse.com/1224566"
},
{
"category": "self",
"summary": "SUSE Bug 1224580",
"url": "https://bugzilla.suse.com/1224580"
},
{
"category": "self",
"summary": "SUSE Bug 1224592",
"url": "https://bugzilla.suse.com/1224592"
},
{
"category": "self",
"summary": "SUSE Bug 1224601",
"url": "https://bugzilla.suse.com/1224601"
},
{
"category": "self",
"summary": "SUSE Bug 1224607",
"url": "https://bugzilla.suse.com/1224607"
},
{
"category": "self",
"summary": "SUSE Bug 1224621",
"url": "https://bugzilla.suse.com/1224621"
},
{
"category": "self",
"summary": "SUSE Bug 1224644",
"url": "https://bugzilla.suse.com/1224644"
},
{
"category": "self",
"summary": "SUSE Bug 1224645",
"url": "https://bugzilla.suse.com/1224645"
},
{
"category": "self",
"summary": "SUSE Bug 1224648",
"url": "https://bugzilla.suse.com/1224648"
},
{
"category": "self",
"summary": "SUSE Bug 1224650",
"url": "https://bugzilla.suse.com/1224650"
},
{
"category": "self",
"summary": "SUSE Bug 1224663",
"url": "https://bugzilla.suse.com/1224663"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224676",
"url": "https://bugzilla.suse.com/1224676"
},
{
"category": "self",
"summary": "SUSE Bug 1224680",
"url": "https://bugzilla.suse.com/1224680"
},
{
"category": "self",
"summary": "SUSE Bug 1224682",
"url": "https://bugzilla.suse.com/1224682"
},
{
"category": "self",
"summary": "SUSE Bug 1224725",
"url": "https://bugzilla.suse.com/1224725"
},
{
"category": "self",
"summary": "SUSE Bug 1224728",
"url": "https://bugzilla.suse.com/1224728"
},
{
"category": "self",
"summary": "SUSE Bug 1224733",
"url": "https://bugzilla.suse.com/1224733"
},
{
"category": "self",
"summary": "SUSE Bug 1224738",
"url": "https://bugzilla.suse.com/1224738"
},
{
"category": "self",
"summary": "SUSE Bug 1224747",
"url": "https://bugzilla.suse.com/1224747"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224759",
"url": "https://bugzilla.suse.com/1224759"
},
{
"category": "self",
"summary": "SUSE Bug 1224803",
"url": "https://bugzilla.suse.com/1224803"
},
{
"category": "self",
"summary": "SUSE Bug 1224827",
"url": "https://bugzilla.suse.com/1224827"
},
{
"category": "self",
"summary": "SUSE Bug 1224830",
"url": "https://bugzilla.suse.com/1224830"
},
{
"category": "self",
"summary": "SUSE Bug 1224831",
"url": "https://bugzilla.suse.com/1224831"
},
{
"category": "self",
"summary": "SUSE Bug 1224834",
"url": "https://bugzilla.suse.com/1224834"
},
{
"category": "self",
"summary": "SUSE Bug 1224838",
"url": "https://bugzilla.suse.com/1224838"
},
{
"category": "self",
"summary": "SUSE Bug 1224841",
"url": "https://bugzilla.suse.com/1224841"
},
{
"category": "self",
"summary": "SUSE Bug 1224844",
"url": "https://bugzilla.suse.com/1224844"
},
{
"category": "self",
"summary": "SUSE Bug 1224846",
"url": "https://bugzilla.suse.com/1224846"
},
{
"category": "self",
"summary": "SUSE Bug 1224847",
"url": "https://bugzilla.suse.com/1224847"
},
{
"category": "self",
"summary": "SUSE Bug 1224849",
"url": "https://bugzilla.suse.com/1224849"
},
{
"category": "self",
"summary": "SUSE Bug 1224854",
"url": "https://bugzilla.suse.com/1224854"
},
{
"category": "self",
"summary": "SUSE Bug 1224859",
"url": "https://bugzilla.suse.com/1224859"
},
{
"category": "self",
"summary": "SUSE Bug 1224867",
"url": "https://bugzilla.suse.com/1224867"
},
{
"category": "self",
"summary": "SUSE Bug 1224880",
"url": "https://bugzilla.suse.com/1224880"
},
{
"category": "self",
"summary": "SUSE Bug 1224882",
"url": "https://bugzilla.suse.com/1224882"
},
{
"category": "self",
"summary": "SUSE Bug 1224888",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "self",
"summary": "SUSE Bug 1224889",
"url": "https://bugzilla.suse.com/1224889"
},
{
"category": "self",
"summary": "SUSE Bug 1224892",
"url": "https://bugzilla.suse.com/1224892"
},
{
"category": "self",
"summary": "SUSE Bug 1224893",
"url": "https://bugzilla.suse.com/1224893"
},
{
"category": "self",
"summary": "SUSE Bug 1224899",
"url": "https://bugzilla.suse.com/1224899"
},
{
"category": "self",
"summary": "SUSE Bug 1224904",
"url": "https://bugzilla.suse.com/1224904"
},
{
"category": "self",
"summary": "SUSE Bug 1224907",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "self",
"summary": "SUSE Bug 1224916",
"url": "https://bugzilla.suse.com/1224916"
},
{
"category": "self",
"summary": "SUSE Bug 1224917",
"url": "https://bugzilla.suse.com/1224917"
},
{
"category": "self",
"summary": "SUSE Bug 1224922",
"url": "https://bugzilla.suse.com/1224922"
},
{
"category": "self",
"summary": "SUSE Bug 1224926",
"url": "https://bugzilla.suse.com/1224926"
},
{
"category": "self",
"summary": "SUSE Bug 1224930",
"url": "https://bugzilla.suse.com/1224930"
},
{
"category": "self",
"summary": "SUSE Bug 1224931",
"url": "https://bugzilla.suse.com/1224931"
},
{
"category": "self",
"summary": "SUSE Bug 1224942",
"url": "https://bugzilla.suse.com/1224942"
},
{
"category": "self",
"summary": "SUSE Bug 1224954",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "self",
"summary": "SUSE Bug 1224956",
"url": "https://bugzilla.suse.com/1224956"
},
{
"category": "self",
"summary": "SUSE Bug 1224957",
"url": "https://bugzilla.suse.com/1224957"
},
{
"category": "self",
"summary": "SUSE Bug 1224959",
"url": "https://bugzilla.suse.com/1224959"
},
{
"category": "self",
"summary": "SUSE Bug 1224960",
"url": "https://bugzilla.suse.com/1224960"
},
{
"category": "self",
"summary": "SUSE Bug 1224961",
"url": "https://bugzilla.suse.com/1224961"
},
{
"category": "self",
"summary": "SUSE Bug 1224963",
"url": "https://bugzilla.suse.com/1224963"
},
{
"category": "self",
"summary": "SUSE Bug 1224966",
"url": "https://bugzilla.suse.com/1224966"
},
{
"category": "self",
"summary": "SUSE Bug 1224968",
"url": "https://bugzilla.suse.com/1224968"
},
{
"category": "self",
"summary": "SUSE Bug 1224981",
"url": "https://bugzilla.suse.com/1224981"
},
{
"category": "self",
"summary": "SUSE Bug 1224982",
"url": "https://bugzilla.suse.com/1224982"
},
{
"category": "self",
"summary": "SUSE Bug 1224983",
"url": "https://bugzilla.suse.com/1224983"
},
{
"category": "self",
"summary": "SUSE Bug 1224987",
"url": "https://bugzilla.suse.com/1224987"
},
{
"category": "self",
"summary": "SUSE Bug 1224990",
"url": "https://bugzilla.suse.com/1224990"
},
{
"category": "self",
"summary": "SUSE Bug 1224996",
"url": "https://bugzilla.suse.com/1224996"
},
{
"category": "self",
"summary": "SUSE Bug 1225008",
"url": "https://bugzilla.suse.com/1225008"
},
{
"category": "self",
"summary": "SUSE Bug 1225009",
"url": "https://bugzilla.suse.com/1225009"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225022",
"url": "https://bugzilla.suse.com/1225022"
},
{
"category": "self",
"summary": "SUSE Bug 1225026",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "self",
"summary": "SUSE Bug 1225030",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "self",
"summary": "SUSE Bug 1225054",
"url": "https://bugzilla.suse.com/1225054"
},
{
"category": "self",
"summary": "SUSE Bug 1225058",
"url": "https://bugzilla.suse.com/1225058"
},
{
"category": "self",
"summary": "SUSE Bug 1225059",
"url": "https://bugzilla.suse.com/1225059"
},
{
"category": "self",
"summary": "SUSE Bug 1225060",
"url": "https://bugzilla.suse.com/1225060"
},
{
"category": "self",
"summary": "SUSE Bug 1225062",
"url": "https://bugzilla.suse.com/1225062"
},
{
"category": "self",
"summary": "SUSE Bug 1225082",
"url": "https://bugzilla.suse.com/1225082"
},
{
"category": "self",
"summary": "SUSE Bug 1225084",
"url": "https://bugzilla.suse.com/1225084"
},
{
"category": "self",
"summary": "SUSE Bug 1225086",
"url": "https://bugzilla.suse.com/1225086"
},
{
"category": "self",
"summary": "SUSE Bug 1225092",
"url": "https://bugzilla.suse.com/1225092"
},
{
"category": "self",
"summary": "SUSE Bug 1225096",
"url": "https://bugzilla.suse.com/1225096"
},
{
"category": "self",
"summary": "SUSE Bug 1225112",
"url": "https://bugzilla.suse.com/1225112"
},
{
"category": "self",
"summary": "SUSE Bug 1225124",
"url": "https://bugzilla.suse.com/1225124"
},
{
"category": "self",
"summary": "SUSE Bug 1225128",
"url": "https://bugzilla.suse.com/1225128"
},
{
"category": "self",
"summary": "SUSE Bug 1225132",
"url": "https://bugzilla.suse.com/1225132"
},
{
"category": "self",
"summary": "SUSE Bug 1225141",
"url": "https://bugzilla.suse.com/1225141"
},
{
"category": "self",
"summary": "SUSE Bug 1225143",
"url": "https://bugzilla.suse.com/1225143"
},
{
"category": "self",
"summary": "SUSE Bug 1225144",
"url": "https://bugzilla.suse.com/1225144"
},
{
"category": "self",
"summary": "SUSE Bug 1225151",
"url": "https://bugzilla.suse.com/1225151"
},
{
"category": "self",
"summary": "SUSE Bug 1225153",
"url": "https://bugzilla.suse.com/1225153"
},
{
"category": "self",
"summary": "SUSE Bug 1225155",
"url": "https://bugzilla.suse.com/1225155"
},
{
"category": "self",
"summary": "SUSE Bug 1225157",
"url": "https://bugzilla.suse.com/1225157"
},
{
"category": "self",
"summary": "SUSE Bug 1225164",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "self",
"summary": "SUSE Bug 1225177",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "self",
"summary": "SUSE Bug 1225189",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "self",
"summary": "SUSE Bug 1225192",
"url": "https://bugzilla.suse.com/1225192"
},
{
"category": "self",
"summary": "SUSE Bug 1225193",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "self",
"summary": "SUSE Bug 1225198",
"url": "https://bugzilla.suse.com/1225198"
},
{
"category": "self",
"summary": "SUSE Bug 1225201",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "self",
"summary": "SUSE Bug 1225207",
"url": "https://bugzilla.suse.com/1225207"
},
{
"category": "self",
"summary": "SUSE Bug 1225208",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "self",
"summary": "SUSE Bug 1225222",
"url": "https://bugzilla.suse.com/1225222"
},
{
"category": "self",
"summary": "SUSE Bug 1225230",
"url": "https://bugzilla.suse.com/1225230"
},
{
"category": "self",
"summary": "SUSE Bug 1225242",
"url": "https://bugzilla.suse.com/1225242"
},
{
"category": "self",
"summary": "SUSE Bug 1225244",
"url": "https://bugzilla.suse.com/1225244"
},
{
"category": "self",
"summary": "SUSE Bug 1225247",
"url": "https://bugzilla.suse.com/1225247"
},
{
"category": "self",
"summary": "SUSE Bug 1225251",
"url": "https://bugzilla.suse.com/1225251"
},
{
"category": "self",
"summary": "SUSE Bug 1225252",
"url": "https://bugzilla.suse.com/1225252"
},
{
"category": "self",
"summary": "SUSE Bug 1225256",
"url": "https://bugzilla.suse.com/1225256"
},
{
"category": "self",
"summary": "SUSE Bug 1225303",
"url": "https://bugzilla.suse.com/1225303"
},
{
"category": "self",
"summary": "SUSE Bug 1225318",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "self",
"summary": "SUSE Bug 1225322",
"url": "https://bugzilla.suse.com/1225322"
},
{
"category": "self",
"summary": "SUSE Bug 1225329",
"url": "https://bugzilla.suse.com/1225329"
},
{
"category": "self",
"summary": "SUSE Bug 1225330",
"url": "https://bugzilla.suse.com/1225330"
},
{
"category": "self",
"summary": "SUSE Bug 1225336",
"url": "https://bugzilla.suse.com/1225336"
},
{
"category": "self",
"summary": "SUSE Bug 1225347",
"url": "https://bugzilla.suse.com/1225347"
},
{
"category": "self",
"summary": "SUSE Bug 1225351",
"url": "https://bugzilla.suse.com/1225351"
},
{
"category": "self",
"summary": "SUSE Bug 1225354",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "self",
"summary": "SUSE Bug 1225355",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "self",
"summary": "SUSE Bug 1225360",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "self",
"summary": "SUSE Bug 1225366",
"url": "https://bugzilla.suse.com/1225366"
},
{
"category": "self",
"summary": "SUSE Bug 1225367",
"url": "https://bugzilla.suse.com/1225367"
},
{
"category": "self",
"summary": "SUSE Bug 1225384",
"url": "https://bugzilla.suse.com/1225384"
},
{
"category": "self",
"summary": "SUSE Bug 1225390",
"url": "https://bugzilla.suse.com/1225390"
},
{
"category": "self",
"summary": "SUSE Bug 1225404",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "self",
"summary": "SUSE Bug 1225409",
"url": "https://bugzilla.suse.com/1225409"
},
{
"category": "self",
"summary": "SUSE Bug 1225411",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "self",
"summary": "SUSE Bug 1225438",
"url": "https://bugzilla.suse.com/1225438"
},
{
"category": "self",
"summary": "SUSE Bug 1225453",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "self",
"summary": "SUSE Bug 1225479",
"url": "https://bugzilla.suse.com/1225479"
},
{
"category": "self",
"summary": "SUSE Bug 1225482",
"url": "https://bugzilla.suse.com/1225482"
},
{
"category": "self",
"summary": "SUSE Bug 1225506",
"url": "https://bugzilla.suse.com/1225506"
},
{
"category": "self",
"summary": "SUSE Bug 1225549",
"url": "https://bugzilla.suse.com/1225549"
},
{
"category": "self",
"summary": "SUSE Bug 1225560",
"url": "https://bugzilla.suse.com/1225560"
},
{
"category": "self",
"summary": "SUSE Bug 1225572",
"url": "https://bugzilla.suse.com/1225572"
},
{
"category": "self",
"summary": "SUSE Bug 1225640",
"url": "https://bugzilla.suse.com/1225640"
},
{
"category": "self",
"summary": "SUSE Bug 1225708",
"url": "https://bugzilla.suse.com/1225708"
},
{
"category": "self",
"summary": "SUSE Bug 1225764",
"url": "https://bugzilla.suse.com/1225764"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46933 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46955 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47074 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47113 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47131 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47162 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47171 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47188 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47206 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47220 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47229 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47231 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47235 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47236 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47237 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47238 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47239 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47245 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47246 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47248 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47249 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47250 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47254 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47258 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47260 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47261 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47269 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47274 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47276 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47277 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47280 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47281 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47284 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47285 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47288 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47301 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47302 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47305 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47307 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47308 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47310 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47314 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47315 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47319 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47320 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47323 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47324 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47330 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47334 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47337 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47343 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47344 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47347 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47352 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47353 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47355 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47356 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47357 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47361 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47369 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47391 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47397 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47400 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47401 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47404 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47409 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47423 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47424 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47431 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47435 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47436 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47456 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47458 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47460 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47469 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47472 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47473 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47478 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47480 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47485 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47485/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47495 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47496 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47497 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47497/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47500 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47509 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47511 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47523 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47541 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47548 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47565 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48636 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48650 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48672 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48686 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48697 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48702 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48704 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48708 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48710 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0160 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1829 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42755 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-47233 page",
"url": "https://www.suse.com/security/cve/CVE-2023-47233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52527 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52586 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52591 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52646 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52653 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52655 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52664 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52685 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52686 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52691 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52696 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52698 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52703 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52730 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52741 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52742 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52747 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52759 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52774 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52781 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52796 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52821 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52864 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52865 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52867 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52875 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52880 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0639 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26625 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26739 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26752 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26791 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26828 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26846 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26874 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26876 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26900 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26915 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26920 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26921 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26929 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26930 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26931 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26957 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26984 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26996 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27008 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27054 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27062 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27388 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27396 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27398 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27401 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27419 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27436 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35791 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35809 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35811 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35830 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35877 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35895 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35914 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35932 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35935 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35936 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35944 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35955 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35969 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35982 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35984 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36015 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36029 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36954 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36954/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-06-11T10:56:58Z",
"generator": {
"date": "2024-06-11T10:56:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1983-1",
"initial_release_date": "2024-06-11T10:56:58Z",
"revision_history": [
{
"date": "2024-06-11T10:56:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.188.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.188.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.188.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.188.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.188.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.188.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.188.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.188.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.188.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.188.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.188.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.188.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.188.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46933"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function\u0027s USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear \u003e set_ftrace_filter\n/sys/kernel/debug/tracing# echo function \u003e current_tracer\n/sys/kernel/debug/tracing# echo 1 \u003e tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 \u003e tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436 [000] ..... 1946.208786: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] ..... 1946.279147: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] .n... 1946.905512: ffs_data_clear \u003c-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G C OE 5.15.0-1-rpi #1 Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [\u003cc08d60a0\u003e] (dump_backtrace) from [\u003cc08d62ec\u003e] (show_stack+0x20/0x24)\n[ 1946.448226] r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [\u003cc08d62cc\u003e] (show_stack) from [\u003cc08d9ae0\u003e] (dump_stack+0x28/0x30)\n[ 1946.470380] [\u003cc08d9ab8\u003e] (dump_stack) from [\u003cc0123500\u003e] (__warn+0xe8/0x154)\n[ 1946.482067] r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [\u003cc0123418\u003e] (__warn) from [\u003cc08d6948\u003e] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758] r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [\u003cc08d68ac\u003e] (warn_slowpath_fmt) from [\u003cc04a948c\u003e] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309] r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [\u003cc04a937c\u003e] (refcount_warn_saturate) from [\u003cc0380134\u003e] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [\u003cc03800ec\u003e] (eventfd_ctx_put) from [\u003cbf5464e8\u003e] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664] r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [\u003cbf546418\u003e] (ffs_data_clear [usb_f_fs]) from [\u003cbf547cc0\u003e] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608] r5:bf54d014 r4:c2695b00\n[ 1946.617522] [\u003cbf547c24\u003e] (ffs_data_closed [usb_f_fs]) from [\u003cbf547da0\u003e] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217] r7:c0dfcb\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46933",
"url": "https://www.suse.com/security/cve/CVE-2021-46933"
},
{
"category": "external",
"summary": "SUSE Bug 1220487 for CVE-2021-46933",
"url": "https://bugzilla.suse.com/1220487"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46955"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix stack OOB read while fragmenting IPv4 packets\n\nrunning openvswitch on kernels built with KASAN, it\u0027s possible to see the\nfollowing splat while testing fragmentation of IPv4 packets:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888112fc713c by task handler2/1367\n\n CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n dump_stack+0x92/0xc1\n print_address_description.constprop.7+0x1a/0x150\n kasan_report.cold.13+0x7f/0x111\n ip_do_fragment+0x1b03/0x1f60\n ovs_fragment+0x5bf/0x840 [openvswitch]\n do_execute_actions+0x1bd5/0x2400 [openvswitch]\n ovs_execute_actions+0xc8/0x3d0 [openvswitch]\n ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]\n genl_family_rcv_msg_doit.isra.15+0x227/0x2d0\n genl_rcv_msg+0x287/0x490\n netlink_rcv_skb+0x120/0x380\n genl_rcv+0x24/0x40\n netlink_unicast+0x439/0x630\n netlink_sendmsg+0x719/0xbf0\n sock_sendmsg+0xe2/0x110\n ____sys_sendmsg+0x5ba/0x890\n ___sys_sendmsg+0xe9/0x160\n __sys_sendmsg+0xd3/0x170\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f957079db07\n Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48\n RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07\n RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019\n RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730\n R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\n R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0\n\n The buggy address belongs to the page:\n page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:\n ovs_fragment+0x0/0x840 [openvswitch]\n\n this frame has 2 objects:\n [32, 144) \u0027ovs_dst\u0027\n [192, 424) \u0027ovs_rt\u0027\n\n Memory state around the buggy address:\n ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00\n \u003effff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00\n ^\n ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00\n\nfor IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n ip_do_fragment()\n ip_skb_dst_mtu()\n ip_dst_mtu_maybe_forward()\n ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin ovs_fragment(), similarly to what is done for IPv6 few lines below.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46955",
"url": "https://www.suse.com/security/cve/CVE-2021-46955"
},
{
"category": "external",
"summary": "SUSE Bug 1220513 for CVE-2021-46955",
"url": "https://bugzilla.suse.com/1220513"
},
{
"category": "external",
"summary": "SUSE Bug 1220537 for CVE-2021-46955",
"url": "https://bugzilla.suse.com/1220537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47074",
"url": "https://www.suse.com/security/cve/CVE-2021-47074"
},
{
"category": "external",
"summary": "SUSE Bug 1220854 for CVE-2021-47074",
"url": "https://bugzilla.suse.com/1220854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: abort in rename_exchange if we fail to insert the second ref\n\nError injection stress uncovered a problem where we\u0027d leave a dangling\ninode ref if we failed during a rename_exchange. This happens because\nwe insert the inode ref for one side of the rename, and then for the\nother side. If this second inode ref insert fails we\u0027ll leave the first\none dangling and leave a corrupt file system behind. Fix this by\naborting if we did the insert for the first inode ref.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47113",
"url": "https://www.suse.com/security/cve/CVE-2021-47113"
},
{
"category": "external",
"summary": "SUSE Bug 1221543 for CVE-2021-47113",
"url": "https://bugzilla.suse.com/1221543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix use-after-free after the TLS device goes down and up\n\nWhen a netdev with active TLS offload goes down, tls_device_down is\ncalled to stop the offload and tear down the TLS context. However, the\nsocket stays alive, and it still points to the TLS context, which is now\ndeallocated. If a netdev goes up, while the connection is still active,\nand the data flow resumes after a number of TCP retransmissions, it will\nlead to a use-after-free of the TLS context.\n\nThis commit addresses this bug by keeping the context alive until its\nnormal destruction, and implements the necessary fallbacks, so that the\nconnection can resume in software (non-offloaded) kTLS mode.\n\nOn the TX side tls_sw_fallback is used to encrypt all packets. The RX\nside already has all the necessary fallbacks, because receiving\nnon-decrypted packets is supported. The thing needed on the RX side is\nto block resync requests, which are normally produced after receiving\nnon-decrypted packets.\n\nThe necessary synchronization is implemented for a graceful teardown:\nfirst the fallbacks are deployed, then the driver resources are released\n(it used to be possible to have a tls_dev_resync after tls_dev_del).\n\nA new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback\nmode. It\u0027s used to skip the RX resync logic completely, as it becomes\nuseless, and some objects may be released (for example, resync_async,\nwhich is allocated and freed by the driver).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47131",
"url": "https://www.suse.com/security/cve/CVE-2021-47131"
},
{
"category": "external",
"summary": "SUSE Bug 1221545 for CVE-2021-47131",
"url": "https://bugzilla.suse.com/1221545"
},
{
"category": "external",
"summary": "SUSE Bug 1222402 for CVE-2021-47131",
"url": "https://bugzilla.suse.com/1222402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n [] kernel BUG at net/core/skbuff.c:1970!\n [] Call Trace:\n [] skb_clone+0x4d/0xb0\n [] macvlan_broadcast+0xd8/0x160 [macvlan]\n [] macvlan_process_broadcast+0x148/0x150 [macvlan]\n [] process_one_work+0x1a7/0x360\n [] worker_thread+0x30/0x390\n\n [] kernel BUG at mm/usercopy.c:102!\n [] Call Trace:\n [] __check_heap_object+0xd3/0x100\n [] __check_object_size+0xff/0x16b\n [] simple_copy_to_iter+0x1c/0x30\n [] __skb_datagram_iter+0x7d/0x310\n [] __skb_datagram_iter+0x2a5/0x310\n [] skb_copy_datagram_iter+0x3b/0x90\n [] tipc_recvmsg+0x14a/0x3a0 [tipc]\n [] ____sys_recvmsg+0x91/0x150\n [] ___sys_recvmsg+0x7b/0xc0\n\n [] kernel BUG at mm/slub.c:305!\n [] Call Trace:\n [] \u003cIRQ\u003e\n [] kmem_cache_free+0x3ff/0x400\n [] __netif_receive_skb_core+0x12c/0xc40\n [] ? kmem_cache_alloc+0x12e/0x270\n [] netif_receive_skb_internal+0x3d/0xb0\n [] ? get_rx_page_info+0x8e/0xa0 [be2net]\n [] be_poll+0x6ef/0xd00 [be2net]\n [] ? irq_exit+0x4f/0x100\n [] net_rx_action+0x149/0x3b0\n\n ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47162",
"url": "https://www.suse.com/security/cve/CVE-2021-47162"
},
{
"category": "external",
"summary": "SUSE Bug 1221977 for CVE-2021-47162",
"url": "https://bugzilla.suse.com/1221977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n [\u003cffffffff84245b62\u003e] kmalloc include/linux/slab.h:556 [inline]\n [\u003cffffffff84245b62\u003e] kzalloc include/linux/slab.h:686 [inline]\n [\u003cffffffff84245b62\u003e] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n [\u003cffffffff82b5b2e6\u003e] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47171",
"url": "https://www.suse.com/security/cve/CVE-2021-47171"
},
{
"category": "external",
"summary": "SUSE Bug 1221994 for CVE-2021-47171",
"url": "https://bugzilla.suse.com/1221994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47188",
"url": "https://www.suse.com/security/cve/CVE-2021-47188"
},
{
"category": "external",
"summary": "SUSE Bug 1222671 for CVE-2021-47188",
"url": "https://bugzilla.suse.com/1222671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47206",
"url": "https://www.suse.com/security/cve/CVE-2021-47206"
},
{
"category": "external",
"summary": "SUSE Bug 1222894 for CVE-2021-47206",
"url": "https://bugzilla.suse.com/1222894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47220"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47220",
"url": "https://www.suse.com/security/cve/CVE-2021-47220"
},
{
"category": "external",
"summary": "SUSE Bug 1224859 for CVE-2021-47220",
"url": "https://bugzilla.suse.com/1224859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: aardvark: Fix kernel panic during PIO transfer\n\nTrying to start a new PIO transfer by writing value 0 in PIO_START register\nwhen previous transfer has not yet completed (which is indicated by value 1\nin PIO_START) causes an External Abort on CPU, which results in kernel\npanic:\n\n SError Interrupt on CPU0, code 0xbf000002 -- SError\n Kernel panic - not syncing: Asynchronous SError Interrupt\n\nTo prevent kernel panic, it is required to reject a new PIO transfer when\nprevious one has not finished yet.\n\nIf previous PIO transfer is not finished yet, the kernel may issue a new\nPIO request only if the previous PIO transfer timed out.\n\nIn the past the root cause of this issue was incorrectly identified (as it\noften happens during link retraining or after link down event) and special\nhack was implemented in Trusted Firmware to catch all SError events in EL3,\nto ignore errors with code 0xbf000002 and not forwarding any other errors\nto kernel and instead throw panic from EL3 Trusted Firmware handler.\n\nLinks to discussion and patches about this issue:\nhttps://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50\nhttps://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/\nhttps://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/\nhttps://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541\n\nBut the real cause was the fact that during link retraining or after link\ndown event the PIO transfer may take longer time, up to the 1.44s until it\ntimes out. This increased probability that a new PIO transfer would be\nissued by kernel while previous one has not finished yet.\n\nAfter applying this change into the kernel, it is possible to revert the\nmentioned TF-A hack and SError events do not have to be caught in TF-A EL3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47229",
"url": "https://www.suse.com/security/cve/CVE-2021-47229"
},
{
"category": "external",
"summary": "SUSE Bug 1224854 for CVE-2021-47229",
"url": "https://bugzilla.suse.com/1224854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: fix memory leak in mcba_usb\n\nSyzbot reported memory leak in SocketCAN driver for Microchip CAN BUS\nAnalyzer Tool. The problem was in unfreed usb_coherent.\n\nIn mcba_usb_start() 20 coherent buffers are allocated and there is\nnothing, that frees them:\n\n1) In callback function the urb is resubmitted and that\u0027s all\n2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER\n is not set (see mcba_usb_start) and this flag cannot be used with\n coherent buffers.\n\nFail log:\n| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected\n| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)\n\nSo, all allocated buffers should be freed with usb_free_coherent()\nexplicitly\n\nNOTE:\nThe same pattern for allocating and freeing coherent buffers\nis used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47231",
"url": "https://www.suse.com/security/cve/CVE-2021-47231"
},
{
"category": "external",
"summary": "SUSE Bug 1224849 for CVE-2021-47231",
"url": "https://bugzilla.suse.com/1224849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: fix potential use-after-free in ec_bhf_remove\n\nstatic void ec_bhf_remove(struct pci_dev *dev)\n{\n...\n\tstruct ec_bhf_priv *priv = netdev_priv(net_dev);\n\n\tunregister_netdev(net_dev);\n\tfree_netdev(net_dev);\n\n\tpci_iounmap(dev, priv-\u003edma_io);\n\tpci_iounmap(dev, priv-\u003eio);\n...\n}\n\npriv is netdev private data, but it is used\nafter free_netdev(). It can cause use-after-free when accessing priv\npointer. So, fix it by moving free_netdev() after pci_iounmap()\ncalls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47235",
"url": "https://www.suse.com/security/cve/CVE-2021-47235"
},
{
"category": "external",
"summary": "SUSE Bug 1224844 for CVE-2021-47235",
"url": "https://bugzilla.suse.com/1224844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2021-47236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47236",
"url": "https://www.suse.com/security/cve/CVE-2021-47236"
},
{
"category": "external",
"summary": "SUSE Bug 1224841 for CVE-2021-47236",
"url": "https://bugzilla.suse.com/1224841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47236"
},
{
"cve": "CVE-2021-47237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47237"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hamradio: fix memory leak in mkiss_close\n\nMy local syzbot instance hit memory leak in\nmkiss_open()[1]. The problem was in missing\nfree_netdev() in mkiss_close().\n\nIn mkiss_open() netdevice is allocated and then\nregistered, but in mkiss_close() netdevice was\nonly unregistered, but not freed.\n\nFail log:\n\nBUG: memory leak\nunreferenced object 0xffff8880281ba000 (size 4096):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00 ax0.............\n 00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00 .\u0027.*............\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706e7e8\u003e] alloc_netdev_mqs+0x98/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880141a9a00 (size 96):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff ...(.......(....\n 98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00 .....@..........\n backtrace:\n [\u003cffffffff8709f68b\u003e] __hw_addr_create_ex+0x5b/0x310\n [\u003cffffffff8709fb38\u003e] __hw_addr_add_ex+0x1f8/0x2b0\n [\u003cffffffff870a0c7b\u003e] dev_addr_init+0x10b/0x1f0\n [\u003cffffffff8706e88b\u003e] alloc_netdev_mqs+0x13b/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880219bfc00 (size 512):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff ...(............\n 80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706eec7\u003e] alloc_netdev_mqs+0x777/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff888029b2b200 (size 256):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706f062\u003e] alloc_netdev_mqs+0x912/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47237",
"url": "https://www.suse.com/security/cve/CVE-2021-47237"
},
{
"category": "external",
"summary": "SUSE Bug 1224830 for CVE-2021-47237",
"url": "https://bugzilla.suse.com/1224830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47237"
},
{
"cve": "CVE-2021-47238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in ip_mc_add1_src\n\nBUG: memory leak\nunreferenced object 0xffff888101bc4c00 (size 32):\n comm \"syz-executor527\", pid 360, jiffies 4294807421 (age 19.329s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................\n backtrace:\n [\u003c00000000f17c5244\u003e] kmalloc include/linux/slab.h:558 [inline]\n [\u003c00000000f17c5244\u003e] kzalloc include/linux/slab.h:688 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095\n [\u003c000000001cb99709\u003e] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416\n [\u003c0000000052cf19ed\u003e] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]\n [\u003c0000000052cf19ed\u003e] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423\n [\u003c00000000477edfbc\u003e] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857\n [\u003c00000000e75ca9bb\u003e] __sys_setsockopt+0x158/0x270 net/socket.c:2117\n [\u003c00000000bdb993a8\u003e] __do_sys_setsockopt net/socket.c:2128 [inline]\n [\u003c00000000bdb993a8\u003e] __se_sys_setsockopt net/socket.c:2125 [inline]\n [\u003c00000000bdb993a8\u003e] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125\n [\u003c000000006a1ffdbd\u003e] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47\n [\u003c00000000b11467c4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn commit 24803f38a5c0 (\"igmp: do not remove igmp souce list info when set\nlink down\"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,\nbecause it was also called in igmpv3_clear_delrec().\n\nRough callgraph:\n\ninetdev_destroy\n-\u003e ip_mc_destroy_dev\n -\u003e igmpv3_clear_delrec\n -\u003e ip_mc_clear_src\n-\u003e RCU_INIT_POINTER(dev-\u003eip_ptr, NULL)\n\nHowever, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn\u0027t\nrelease in_dev-\u003emc_list-\u003esources. And RCU_INIT_POINTER() assigns the\nNULL to dev-\u003eip_ptr. As a result, in_dev cannot be obtained through\ninetdev_by_index() and then in_dev-\u003emc_list-\u003esources cannot be released\nby ip_mc_del1_src() in the sock_close. Rough call sequence goes like:\n\nsock_close\n-\u003e __sock_release\n -\u003e inet_release\n -\u003e ip_mc_drop_socket\n -\u003e inetdev_by_index\n -\u003e ip_mc_leave_src\n -\u003e ip_mc_del_src\n -\u003e ip_mc_del1_src\n\nSo we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free\nin_dev-\u003emc_list-\u003esources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47238",
"url": "https://www.suse.com/security/cve/CVE-2021-47238"
},
{
"category": "external",
"summary": "SUSE Bug 1224847 for CVE-2021-47238",
"url": "https://bugzilla.suse.com/1224847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47238"
},
{
"cve": "CVE-2021-47239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47239",
"url": "https://www.suse.com/security/cve/CVE-2021-47239"
},
{
"category": "external",
"summary": "SUSE Bug 1224846 for CVE-2021-47239",
"url": "https://bugzilla.suse.com/1224846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47239"
},
{
"cve": "CVE-2021-47245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: synproxy: Fix out of bounds when parsing TCP options\n\nThe TCP option parser in synproxy (synproxy_parse_options) could read\none byte out of bounds. When the length is 1, the execution flow gets\ninto the loop, reads one byte of the opcode, and if the opcode is\nneither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds\nthe length of 1.\n\nThis fix is inspired by commit 9609dad263f8 (\"ipv4: tcp_input: fix stack\nout of bounds when parsing TCP options.\").\n\nv2 changes:\n\nAdded an early return when length \u003c 0 to avoid calling\nskb_header_pointer with negative length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47245",
"url": "https://www.suse.com/security/cve/CVE-2021-47245"
},
{
"category": "external",
"summary": "SUSE Bug 1224838 for CVE-2021-47245",
"url": "https://bugzilla.suse.com/1224838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47245"
},
{
"cve": "CVE-2021-47246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47246"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix page reclaim for dead peer hairpin\n\nWhen adding a hairpin flow, a firmware-side send queue is created for\nthe peer net device, which claims some host memory pages for its\ninternal ring buffer. If the peer net device is removed/unbound before\nthe hairpin flow is deleted, then the send queue is not destroyed which\nleads to a stack trace on pci device remove:\n\n[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource\n[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110\n[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0\n[ 748.002171] ------------[ cut here ]------------\n[ 748.001177] FW pages counter is 4 after reclaiming all pages\n[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [ +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]\n[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1\n[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]\n[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 \u003c0f\u003e 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9\n[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286\n[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000\n[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51\n[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8\n[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30\n[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000\n[ 748.001429] FS: 00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000\n[ 748.001695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0\n[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 748.001654] Call Trace:\n[ 748.000576] ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]\n[ 748.001416] ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]\n[ 748.001354] ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]\n[ 748.001203] mlx5_function_teardown+0x30/0x60 [mlx5_core]\n[ 748.001275] mlx5_uninit_one+0xa7/0xc0 [mlx5_core]\n[ 748.001200] remove_one+0x5f/0xc0 [mlx5_core]\n[ 748.001075] pci_device_remove+0x9f/0x1d0\n[ 748.000833] device_release_driver_internal+0x1e0/0x490\n[ 748.001207] unbind_store+0x19f/0x200\n[ 748.000942] ? sysfs_file_ops+0x170/0x170\n[ 748.001000] kernfs_fop_write_iter+0x2bc/0x450\n[ 748.000970] new_sync_write+0x373/0x610\n[ 748.001124] ? new_sync_read+0x600/0x600\n[ 748.001057] ? lock_acquire+0x4d6/0x700\n[ 748.000908] ? lockdep_hardirqs_on_prepare+0x400/0x400\n[ 748.001126] ? fd_install+0x1c9/0x4d0\n[ 748.000951] vfs_write+0x4d0/0x800\n[ 748.000804] ksys_write+0xf9/0x1d0\n[ 748.000868] ? __x64_sys_read+0xb0/0xb0\n[ 748.000811] ? filp_open+0x50/0x50\n[ 748.000919] ? syscall_enter_from_user_mode+0x1d/0x50\n[ 748.001223] do_syscall_64+0x3f/0x80\n[ 748.000892] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 748.00\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47246",
"url": "https://www.suse.com/security/cve/CVE-2021-47246"
},
{
"category": "external",
"summary": "SUSE Bug 1224831 for CVE-2021-47246",
"url": "https://bugzilla.suse.com/1224831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47246"
},
{
"cve": "CVE-2021-47248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: fix race between close() and udp_abort()\n\nKaustubh reported and diagnosed a panic in udp_lib_lookup().\nThe root cause is udp_abort() racing with close(). Both\nracing functions acquire the socket lock, but udp{v6}_destroy_sock()\nrelease it before performing destructive actions.\n\nWe can\u0027t easily extend the socket lock scope to avoid the race,\ninstead use the SOCK_DEAD flag to prevent udp_abort from doing\nany action when the critical race happens.\n\nDiagnosed-and-tested-by: Kaustubh Pandey \u003ckapandey@codeaurora.org\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47248",
"url": "https://www.suse.com/security/cve/CVE-2021-47248"
},
{
"category": "external",
"summary": "SUSE Bug 1224867 for CVE-2021-47248",
"url": "https://bugzilla.suse.com/1224867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47248"
},
{
"cve": "CVE-2021-47249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47249"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: fix memory leak in rds_recvmsg\n\nSyzbot reported memory leak in rds. The problem\nwas in unputted refcount in case of error.\n\nint rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,\n\t\tint msg_flags)\n{\n...\n\n\tif (!rds_next_incoming(rs, \u0026inc)) {\n\t\t...\n\t}\n\nAfter this \"if\" inc refcount incremented and\n\n\tif (rds_cmsg_recv(inc, msg, rs)) {\n\t\tret = -EFAULT;\n\t\tgoto out;\n\t}\n...\nout:\n\treturn ret;\n}\n\nin case of rds_cmsg_recv() fail the refcount won\u0027t be\ndecremented. And it\u0027s easy to see from ftrace log, that\nrds_inc_addref() don\u0027t have rds_inc_put() pair in\nrds_recvmsg() after rds_cmsg_recv()\n\n 1) | rds_recvmsg() {\n 1) 3.721 us | rds_inc_addref();\n 1) 3.853 us | rds_message_inc_copy_to_user();\n 1) + 10.395 us | rds_cmsg_recv();\n 1) + 34.260 us | }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47249",
"url": "https://www.suse.com/security/cve/CVE-2021-47249"
},
{
"category": "external",
"summary": "SUSE Bug 1224880 for CVE-2021-47249",
"url": "https://bugzilla.suse.com/1224880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47249"
},
{
"cve": "CVE-2021-47250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in netlbl_cipsov4_add_std\n\nReported by syzkaller:\nBUG: memory leak\nunreferenced object 0xffff888105df7000 (size 64):\ncomm \"syz-executor842\", pid 360, jiffies 4294824824 (age 22.546s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003c00000000e67ed558\u003e] kmalloc include/linux/slab.h:590 [inline]\n[\u003c00000000e67ed558\u003e] kzalloc include/linux/slab.h:720 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416\n[\u003c0000000006040154\u003e] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739\n[\u003c00000000204d7a1c\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n[\u003c00000000204d7a1c\u003e] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800\n[\u003c00000000c0d6a995\u003e] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504\n[\u003c00000000d78b9d2c\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n[\u003c000000009733081b\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n[\u003c000000009733081b\u003e] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340\n[\u003c00000000d5fd43b8\u003e] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929\n[\u003c000000000a2d1e40\u003e] sock_sendmsg_nosec net/socket.c:654 [inline]\n[\u003c000000000a2d1e40\u003e] sock_sendmsg+0x139/0x170 net/socket.c:674\n[\u003c00000000321d1969\u003e] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350\n[\u003c00000000964e16bc\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404\n[\u003c000000001615e288\u003e] __sys_sendmsg+0xd3/0x190 net/socket.c:2433\n[\u003c000000004ee8b6a5\u003e] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47\n[\u003c00000000171c7cee\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe memory of doi_def-\u003emap.std pointing is allocated in\nnetlbl_cipsov4_add_std, but no place has freed it. It should be\nfreed in cipso_v4_doi_free which frees the cipso DOI resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47250",
"url": "https://www.suse.com/security/cve/CVE-2021-47250"
},
{
"category": "external",
"summary": "SUSE Bug 1224827 for CVE-2021-47250",
"url": "https://bugzilla.suse.com/1224827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47250"
},
{
"cve": "CVE-2021-47252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid WARN_ON timing related checks\n\nThe soft/batadv interface for a queued OGM can be changed during the time\nthe OGM was queued for transmission and when the OGM is actually\ntransmitted by the worker.\n\nBut WARN_ON must be used to denote kernel bugs and not to print simple\nwarnings. A warning can simply be printed using pr_warn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47252",
"url": "https://www.suse.com/security/cve/CVE-2021-47252"
},
{
"category": "external",
"summary": "SUSE Bug 1224882 for CVE-2021-47252",
"url": "https://bugzilla.suse.com/1224882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47252"
},
{
"cve": "CVE-2021-47254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(\u0026lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(\u0026lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47254",
"url": "https://www.suse.com/security/cve/CVE-2021-47254"
},
{
"category": "external",
"summary": "SUSE Bug 1224888 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "external",
"summary": "SUSE Bug 1227559 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1227559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47254"
},
{
"cve": "CVE-2021-47258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47258"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix error handling of scsi_host_alloc()\n\nAfter device is initialized via device_initialize(), or its name is set via\ndev_set_name(), the device has to be freed via put_device(). Otherwise\ndevice name will be leaked because it is allocated dynamically in\ndev_set_name().\n\nFix the leak by replacing kfree() with put_device(). Since\nscsi_host_dev_release() properly handles IDA and kthread removal, remove\nspecial-casing these from the error handling as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47258",
"url": "https://www.suse.com/security/cve/CVE-2021-47258"
},
{
"category": "external",
"summary": "SUSE Bug 1224899 for CVE-2021-47258",
"url": "https://bugzilla.suse.com/1224899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47258"
},
{
"cve": "CVE-2021-47260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a potential NULL dereference in nfs_get_client()\n\nNone of the callers are expecting NULL returns from nfs_get_client() so\nthis code will lead to an Oops. It\u0027s better to return an error\npointer. I expect that this is dead code so hopefully no one is\naffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47260",
"url": "https://www.suse.com/security/cve/CVE-2021-47260"
},
{
"category": "external",
"summary": "SUSE Bug 1224834 for CVE-2021-47260",
"url": "https://bugzilla.suse.com/1224834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47260"
},
{
"cve": "CVE-2021-47261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix initializing CQ fragments buffer\n\nThe function init_cq_frag_buf() can be called to initialize the current CQ\nfragments buffer cq-\u003ebuf, or the temporary cq-\u003eresize_buf that is filled\nduring CQ resize operation.\n\nHowever, the offending commit started to use function get_cqe() for\ngetting the CQEs, the issue with this change is that get_cqe() always\nreturns CQEs from cq-\u003ebuf, which leads us to initialize the wrong buffer,\nand in case of enlarging the CQ we try to access elements beyond the size\nof the current cq-\u003ebuf and eventually hit a kernel panic.\n\n [exception RIP: init_cq_frag_buf+103]\n [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]\n [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]\n [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]\n [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]\n [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]\n [ffff9f799ddcbec8] kthread at ffffffffa66c5da1\n [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd\n\nFix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that\ntakes the correct source buffer as a parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47261",
"url": "https://www.suse.com/security/cve/CVE-2021-47261"
},
{
"category": "external",
"summary": "SUSE Bug 1224954 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "external",
"summary": "SUSE Bug 1227751 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1227751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47261"
},
{
"cve": "CVE-2021-47265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47265"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA: Verify port when creating flow rule\n\nValidate port value provided by the user and with that remove no longer\nneeded validation by the driver. The missing check in the mlx5_ib driver\ncould cause to the below oops.\n\nCall trace:\n _create_flow_rule+0x2d4/0xf28 [mlx5_ib]\n mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]\n ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]\n ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]\n ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]\n ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]\n do_vfs_ioctl+0xd0/0xaf0\n ksys_ioctl+0x84/0xb4\n __arm64_sys_ioctl+0x28/0xc4\n el0_svc_common.constprop.3+0xa4/0x254\n el0_svc_handler+0x84/0xa0\n el0_svc+0x10/0x26c\n Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47265",
"url": "https://www.suse.com/security/cve/CVE-2021-47265"
},
{
"category": "external",
"summary": "SUSE Bug 1224957 for CVE-2021-47265",
"url": "https://bugzilla.suse.com/1224957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47265"
},
{
"cve": "CVE-2021-47269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: ep0: fix NULL pointer exception\n\nThere is no validation of the index from dwc3_wIndex_to_dep() and we might\nbe referring a non-existing ep and trigger a NULL pointer exception. In\ncertain configurations we might use fewer eps and the index might wrongly\nindicate a larger ep index than existing.\n\nBy adding this validation from the patch we can actually report a wrong\nindex back to the caller.\n\nIn our usecase we are using a composite device on an older kernel, but\nupstream might use this fix also. Unfortunately, I cannot describe the\nhardware for others to reproduce the issue as it is a proprietary\nimplementation.\n\n[ 82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4\n[ 82.966891] Mem abort info:\n[ 82.969663] ESR = 0x96000006\n[ 82.972703] Exception class = DABT (current EL), IL = 32 bits\n[ 82.978603] SET = 0, FnV = 0\n[ 82.981642] EA = 0, S1PTW = 0\n[ 82.984765] Data abort info:\n[ 82.987631] ISV = 0, ISS = 0x00000006\n[ 82.991449] CM = 0, WnR = 0\n[ 82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc\n[ 83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000\n[ 83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP\n[ 83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)\n[ 83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1\n[ 83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)\n[ 83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94\n\n...\n\n[ 83.141788] Call trace:\n[ 83.144227] dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.148823] dwc3_ep0_interrupt+0x3b4/0xc94\n[ 83.181546] ---[ end trace aac6b5267d84c32f ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47269",
"url": "https://www.suse.com/security/cve/CVE-2021-47269"
},
{
"category": "external",
"summary": "SUSE Bug 1224996 for CVE-2021-47269",
"url": "https://bugzilla.suse.com/1224996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47269"
},
{
"cve": "CVE-2021-47274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Correct the length check which causes memory corruption\n\nWe\u0027ve suffered from severe kernel crashes due to memory corruption on\nour production environment, like,\n\nCall Trace:\n[1640542.554277] general protection fault: 0000 [#1] SMP PTI\n[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G\n[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190\n[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286\n[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:\n0000000006e931bf\n[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:\nffff9a45ff004300\n[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:\n0000000000000000\n[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:\nffffffff9a20608d\n[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:\n696c662f65636976\n[1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)\nknlGS:0000000000000000\n[1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:\n00000000003606e0\n[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1640542.566742] Call Trace:\n[1640542.567009] anon_vma_clone+0x5d/0x170\n[1640542.567417] __split_vma+0x91/0x1a0\n[1640542.567777] do_munmap+0x2c6/0x320\n[1640542.568128] vm_munmap+0x54/0x70\n[1640542.569990] __x64_sys_munmap+0x22/0x30\n[1640542.572005] do_syscall_64+0x5b/0x1b0\n[1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[1640542.575642] RIP: 0033:0x7f45d6e61e27\n\nJames Wang has reproduced it stably on the latest 4.19 LTS.\nAfter some debugging, we finally proved that it\u0027s due to ftrace\nbuffer out-of-bound access using a debug tool as follows:\n[ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000\n[ 86.780806] no_context+0xdf/0x3c0\n[ 86.784327] __do_page_fault+0x252/0x470\n[ 86.788367] do_page_fault+0x32/0x140\n[ 86.792145] page_fault+0x1e/0x30\n[ 86.795576] strncpy_from_unsafe+0x66/0xb0\n[ 86.799789] fetch_memory_string+0x25/0x40\n[ 86.804002] fetch_deref_string+0x51/0x60\n[ 86.808134] kprobe_trace_func+0x32d/0x3a0\n[ 86.812347] kprobe_dispatcher+0x45/0x50\n[ 86.816385] kprobe_ftrace_handler+0x90/0xf0\n[ 86.820779] ftrace_ops_assist_func+0xa1/0x140\n[ 86.825340] 0xffffffffc00750bf\n[ 86.828603] do_sys_open+0x5/0x1f0\n[ 86.832124] do_syscall_64+0x5b/0x1b0\n[ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\ncommit b220c049d519 (\"tracing: Check length before giving out\nthe filter buffer\") adds length check to protect trace data\noverflow introduced in 0fc1b09ff1ff, seems that this fix can\u0027t prevent\noverflow entirely, the length check should also take the sizeof\nentry-\u003earray[0] into account, since this array[0] is filled the\nlength of trace data and occupy addtional space and risk overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47274",
"url": "https://www.suse.com/security/cve/CVE-2021-47274"
},
{
"category": "external",
"summary": "SUSE Bug 1224990 for CVE-2021-47274",
"url": "https://bugzilla.suse.com/1224990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47274"
},
{
"cve": "CVE-2021-47276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47276"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Do not blindly read the ip address in ftrace_bug()\n\nIt was reported that a bug on arm64 caused a bad ip address to be used for\nupdating into a nop in ftrace_init(), but the error path (rightfully)\nreturned -EINVAL and not -EFAULT, as the bug caused more than one error to\noccur. But because -EINVAL was returned, the ftrace_bug() tried to report\nwhat was at the location of the ip address, and read it directly. This\ncaused the machine to panic, as the ip was not pointing to a valid memory\naddress.\n\nInstead, read the ip address with copy_from_kernel_nofault() to safely\naccess the memory, and if it faults, report that the address faulted,\notherwise report what was in that location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47276",
"url": "https://www.suse.com/security/cve/CVE-2021-47276"
},
{
"category": "external",
"summary": "SUSE Bug 1224966 for CVE-2021-47276",
"url": "https://bugzilla.suse.com/1224966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47276"
},
{
"cve": "CVE-2021-47277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: avoid speculation-based attacks from out-of-range memslot accesses\n\nKVM\u0027s mechanism for accessing guest memory translates a guest physical\naddress (gpa) to a host virtual address using the right-shifted gpa\n(also known as gfn) and a struct kvm_memory_slot. The translation is\nperformed in __gfn_to_hva_memslot using the following formula:\n\n hva = slot-\u003euserspace_addr + (gfn - slot-\u003ebase_gfn) * PAGE_SIZE\n\nIt is expected that gfn falls within the boundaries of the guest\u0027s\nphysical memory. However, a guest can access invalid physical addresses\nin such a way that the gfn is invalid.\n\n__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first\nretrieves a memslot through __gfn_to_memslot. While __gfn_to_memslot\ndoes check that the gfn falls within the boundaries of the guest\u0027s\nphysical memory or not, a CPU can speculate the result of the check and\ncontinue execution speculatively using an illegal gfn. The speculation\ncan result in calculating an out-of-bounds hva. If the resulting host\nvirtual address is used to load another guest physical address, this\nis effectively a Spectre gadget consisting of two consecutive reads,\nthe second of which is data dependent on the first.\n\nRight now it\u0027s not clear if there are any cases in which this is\nexploitable. One interesting case was reported by the original author\nof this patch, and involves visiting guest page tables on x86. Right\nnow these are not vulnerable because the hva read goes through get_user(),\nwhich contains an LFENCE speculation barrier. However, there are\npatches in progress for x86 uaccess.h to mask kernel addresses instead of\nusing LFENCE; once these land, a guest could use speculation to read\nfrom the VMM\u0027s ring 3 address space. Other architectures such as ARM\nalready use the address masking method, and would be susceptible to\nthis same kind of data-dependent access gadgets. Therefore, this patch\nproactively protects from these attacks by masking out-of-bounds gfns\nin __gfn_to_hva_memslot, which blocks speculation of invalid hvas.\n\nSean Christopherson noted that this patch does not cover\nkvm_read_guest_offset_cached. This however is limited to a few bytes\npast the end of the cache, and therefore it is unlikely to be useful in\nthe context of building a chain of data dependent accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47277",
"url": "https://www.suse.com/security/cve/CVE-2021-47277"
},
{
"category": "external",
"summary": "SUSE Bug 1224960 for CVE-2021-47277",
"url": "https://bugzilla.suse.com/1224960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47277"
},
{
"cve": "CVE-2021-47280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47280"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free read in drm_getunique()\n\nThere is a time-of-check-to-time-of-use error in drm_getunique() due\nto retrieving file_priv-\u003emaster prior to locking the device\u0027s master\nmutex.\n\nAn example can be seen in the crash report of the use-after-free error\nfound by Syzbot:\nhttps://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803\n\nIn the report, the master pointer was used after being freed. This is\nbecause another process had acquired the device\u0027s master mutex in\ndrm_setmaster_ioctl(), then overwrote fpriv-\u003emaster in\ndrm_new_set_master(). The old value of fpriv-\u003emaster was subsequently\nfreed before the mutex was unlocked.\n\nTo fix this, we lock the device\u0027s master mutex before retrieving the\npointer from from fpriv-\u003emaster. This patch passes the Syzbot\nreproducer test.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47280",
"url": "https://www.suse.com/security/cve/CVE-2021-47280"
},
{
"category": "external",
"summary": "SUSE Bug 1224982 for CVE-2021-47280",
"url": "https://bugzilla.suse.com/1224982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47280"
},
{
"cve": "CVE-2021-47281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: Fix race of snd_seq_timer_open()\n\nThe timer instance per queue is exclusive, and snd_seq_timer_open()\nshould have managed the concurrent accesses. It looks as if it\u0027s\nchecking the already existing timer instance at the beginning, but\nit\u0027s not right, because there is no protection, hence any later\nconcurrent call of snd_seq_timer_open() may override the timer\ninstance easily. This may result in UAF, as the leftover timer\ninstance can keep running while the queue itself gets closed, as\nspotted by syzkaller recently.\n\nFor avoiding the race, add a proper check at the assignment of\ntmr-\u003etimeri again, and return -EBUSY if it\u0027s been already registered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47281",
"url": "https://www.suse.com/security/cve/CVE-2021-47281"
},
{
"category": "external",
"summary": "SUSE Bug 1224983 for CVE-2021-47281",
"url": "https://bugzilla.suse.com/1224983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47281"
},
{
"cve": "CVE-2021-47284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n\u0027nj_setup\u0027 in netjet.c might fail with -EIO and in this case\n\u0027card-\u003eirq\u0027 is initialized and is bigger than zero. A subsequent call to\n\u0027nj_release\u0027 will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to \u0027card-\u003eirq\u0027 and just\nkeep the assignment before \u0027request_irq\u0027.\n\nThe KASAN\u0027s log reveals it:\n\n[ 3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[ 3.355112 ] Modules linked in:\n[ 3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[ 3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff \u003c0f\u003e 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[ 3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[ 3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[ 3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[ 3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[ 3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[ 3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[ 3.360652 ] FS: 0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[ 3.361170 ] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[ 3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[ 3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] nj_release+0x51/0x1e0\n[ 3.362175 ] nj_probe+0x450/0x950\n[ 3.362175 ] ? pci_device_remove+0x110/0x110\n[ 3.362175 ] local_pci_probe+0x45/0xa0\n[ 3.362175 ] pci_device_probe+0x12b/0x1d0\n[ 3.362175 ] really_probe+0x2a9/0x610\n[ 3.362175 ] driver_probe_device+0x90/0x1d0\n[ 3.362175 ] ? mutex_lock_nested+0x1b/0x20\n[ 3.362175 ] device_driver_attach+0x68/0x70\n[ 3.362175 ] __driver_attach+0x124/0x1b0\n[ 3.362175 ] ? device_driver_attach+0x70/0x70\n[ 3.362175 ] bus_for_each_dev+0xbb/0x110\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] driver_attach+0x27/0x30\n[ 3.362175 ] bus_add_driver+0x1eb/0x2a0\n[ 3.362175 ] driver_register+0xa9/0x180\n[ 3.362175 ] __pci_register_driver+0x82/0x90\n[ 3.362175 ] ? w6692_init+0x38/0x38\n[ 3.362175 ] nj_init+0x36/0x38\n[ 3.362175 ] do_one_initcall+0x7f/0x3d0\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] ? rcu_read_lock_sched_held+0x4f/0x80\n[ 3.362175 ] kernel_init_freeable+0x2aa/0x301\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] kernel_init+0x18/0x190\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ret_from_fork+0x1f/0x30\n[ 3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[ 3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] dump_stack+0xba/0xf5\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] panic+0x15a/0x3f2\n[ 3.362175 ] ? __warn+0xf2/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] __warn+0x108/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] report_bug+0x119/0x1c0\n[ 3.362175 ] handle_bug+0x3b/0x80\n[ 3.362175 ] exc_invalid_op+0x18/0x70\n[ 3.362175 ] asm_exc_invalid_op+0x12/0x20\n[ 3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47284",
"url": "https://www.suse.com/security/cve/CVE-2021-47284"
},
{
"category": "external",
"summary": "SUSE Bug 1224987 for CVE-2021-47284",
"url": "https://bugzilla.suse.com/1224987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47285"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47285",
"url": "https://www.suse.com/security/cve/CVE-2021-47285"
},
{
"category": "external",
"summary": "SUSE Bug 1224981 for CVE-2021-47285",
"url": "https://bugzilla.suse.com/1224981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47285"
},
{
"cve": "CVE-2021-47288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47288"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()\n\nFix an 11-year old bug in ngene_command_config_free_buf() while\naddressing the following warnings caught with -Warray-bounds:\n\narch/alpha/include/asm/string.h:22:16: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\narch/x86/include/asm/string_32.h:182:25: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\n\nThe problem is that the original code is trying to copy 6 bytes of\ndata into a one-byte size member _config_ of the wrong structue\nFW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a\nlegitimate compiler warning because memcpy() overruns the length\nof \u0026com.cmd.ConfigureBuffers.config. It seems that the right\nstructure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains\n6 more members apart from the header _hdr_. Also, the name of\nthe function ngene_command_config_free_buf() suggests that the actual\nintention is to ConfigureFreeBuffers, instead of ConfigureBuffers\n(which takes place in the function ngene_command_config_buf(), above).\n\nFix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS\ninto new struct config, and use \u0026com.cmd.ConfigureFreeBuffers.config as\nthe destination address, instead of \u0026com.cmd.ConfigureBuffers.config,\nwhen calling memcpy().\n\nThis also helps with the ongoing efforts to globally enable\n-Warray-bounds and get us closer to being able to tighten the\nFORTIFY_SOURCE routines on memcpy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47288",
"url": "https://www.suse.com/security/cve/CVE-2021-47288"
},
{
"category": "external",
"summary": "SUSE Bug 1224889 for CVE-2021-47288",
"url": "https://bugzilla.suse.com/1224889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47288"
},
{
"cve": "CVE-2021-47301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igb_poll() runs\nwhile the controller is reset this can lead to the driver try to free\na skb that was already freed.\n\n(The crash is harder to reproduce with the igb driver, but the same\npotential problem exists as the code is identical to igc)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47301",
"url": "https://www.suse.com/security/cve/CVE-2021-47301"
},
{
"category": "external",
"summary": "SUSE Bug 1224916 for CVE-2021-47301",
"url": "https://bugzilla.suse.com/1224916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47301"
},
{
"cve": "CVE-2021-47302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47302"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igc_poll() runs\nwhile the controller is being reset this can lead to the driver try to\nfree a skb that was already freed.\n\nLog message:\n\n [ 101.525242] refcount_t: underflow; use-after-free.\n [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0\n [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)\n x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)\n ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)\n rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)\n soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)\n iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)\n soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)\n autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)\n i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)\n [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)\n e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)\n usbcore(E) drm(E) button(E) video(E)\n [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe\n [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017\n [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0\n [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48\n 44 01 01 e8 d1 c6 42 00 \u003c0f\u003e 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3\n [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286\n [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001\n [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff\n [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50\n [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00\n [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40\n [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000\n [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0\n [ 101.525343] Call Trace:\n [ 101.525346] sock_wfree+0x9c/0xa0\n [ 101.525353] unix_destruct_scm+0x7b/0xa0\n [ 101.525358] skb_release_head_state+0x40/0x90\n [ 101.525362] skb_release_all+0xe/0x30\n [ 101.525364] napi_consume_skb+0x57/0x160\n [ 101.525367] igc_poll+0xb7/0xc80 [igc]\n [ 101.525376] ? sched_clock+0x5/0x10\n [ 101.525381] ? sched_clock_cpu+0xe/0x100\n [ 101.525385] net_rx_action+0x14c/0x410\n [ 101.525388] __do_softirq+0xe9/0x2f4\n [ 101.525391] __local_bh_enable_ip+0xe3/0x110\n [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0\n [ 101.525398] irq_forced_thread_fn+0x6a/0x80\n [ 101.525401] irq_thread+0xe8/0x180\n [ 101.525403] ? wake_threads_waitq+0x30/0x30\n [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0\n [ 101.525408] kthread+0x183/0x1a0\n [ 101.525412] ? kthread_park+0x80/0x80\n [ 101.525415] ret_from_fork+0x22/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47302",
"url": "https://www.suse.com/security/cve/CVE-2021-47302"
},
{
"category": "external",
"summary": "SUSE Bug 1224917 for CVE-2021-47302",
"url": "https://bugzilla.suse.com/1224917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47302"
},
{
"cve": "CVE-2021-47305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47305"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sync_file: Don\u0027t leak fences on merge failure\n\nEach add_fence() call does a dma_fence_get() on the relevant fence. In\nthe error path, we weren\u0027t calling dma_fence_put() so all those fences\ngot leaked. Also, in the krealloc_array failure case, we weren\u0027t\nfreeing the fences array. Instead, ensure that i and fences are always\nzero-initialized and dma_fence_put() all the fences and kfree(fences) on\nevery error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47305",
"url": "https://www.suse.com/security/cve/CVE-2021-47305"
},
{
"category": "external",
"summary": "SUSE Bug 1224968 for CVE-2021-47305",
"url": "https://bugzilla.suse.com/1224968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47305"
},
{
"cve": "CVE-2021-47307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47307"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent NULL deref in cifs_compose_mount_options()\n\nThe optional @ref parameter might contain an NULL node_name, so\nprevent dereferencing it in cifs_compose_mount_options().\n\nAddresses-Coverity: 1476408 (\"Explicit null dereferenced\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47307",
"url": "https://www.suse.com/security/cve/CVE-2021-47307"
},
{
"category": "external",
"summary": "SUSE Bug 1224961 for CVE-2021-47307",
"url": "https://bugzilla.suse.com/1224961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47307"
},
{
"cve": "CVE-2021-47308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47308"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix array index out of bound exception\n\nFix array index out of bound exception in fc_rport_prli_resp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47308",
"url": "https://www.suse.com/security/cve/CVE-2021-47308"
},
{
"category": "external",
"summary": "SUSE Bug 1224963 for CVE-2021-47308",
"url": "https://bugzilla.suse.com/1224963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47308"
},
{
"cve": "CVE-2021-47310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47310"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47310",
"url": "https://www.suse.com/security/cve/CVE-2021-47310"
},
{
"category": "external",
"summary": "SUSE Bug 1224959 for CVE-2021-47310",
"url": "https://bugzilla.suse.com/1224959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47310"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47314"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure. Fix this by using resource-managed allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47314",
"url": "https://www.suse.com/security/cve/CVE-2021-47314"
},
{
"category": "external",
"summary": "SUSE Bug 1224893 for CVE-2021-47314",
"url": "https://bugzilla.suse.com/1224893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47314"
},
{
"cve": "CVE-2021-47315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47315"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory. Smatch reports:\n\n drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: \u0027fsl_ifc_ctrl_dev-\u003egregs\u0027 not released on lines: 298.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47315",
"url": "https://www.suse.com/security/cve/CVE-2021-47315"
},
{
"category": "external",
"summary": "SUSE Bug 1224892 for CVE-2021-47315",
"url": "https://bugzilla.suse.com/1224892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47315"
},
{
"cve": "CVE-2021-47319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk-\u003evqs should be freed before we call init_vqs()\nin virtblk_restore().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47319",
"url": "https://www.suse.com/security/cve/CVE-2021-47319"
},
{
"category": "external",
"summary": "SUSE Bug 1225054 for CVE-2021-47319",
"url": "https://bugzilla.suse.com/1225054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47319"
},
{
"cve": "CVE-2021-47320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47320"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47320",
"url": "https://www.suse.com/security/cve/CVE-2021-47320"
},
{
"category": "external",
"summary": "SUSE Bug 1225058 for CVE-2021-47320",
"url": "https://bugzilla.suse.com/1225058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47320"
},
{
"cve": "CVE-2021-47321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47321",
"url": "https://www.suse.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "SUSE Bug 1225060 for CVE-2021-47321",
"url": "https://bugzilla.suse.com/1225060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47321"
},
{
"cve": "CVE-2021-47323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47323"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47323",
"url": "https://www.suse.com/security/cve/CVE-2021-47323"
},
{
"category": "external",
"summary": "SUSE Bug 1225026 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "external",
"summary": "SUSE Bug 1227557 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1227557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47323"
},
{
"cve": "CVE-2021-47324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47324"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47324",
"url": "https://www.suse.com/security/cve/CVE-2021-47324"
},
{
"category": "external",
"summary": "SUSE Bug 1225030 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "external",
"summary": "SUSE Bug 1225038 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225038"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47324"
},
{
"cve": "CVE-2021-47330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47330"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final \u0027serial_config()\u0027 fails, \u0027info\u0027 is\nleaking.\n\nAdd a resource handling path to free this memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47330",
"url": "https://www.suse.com/security/cve/CVE-2021-47330"
},
{
"category": "external",
"summary": "SUSE Bug 1225084 for CVE-2021-47330",
"url": "https://bugzilla.suse.com/1225084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47330"
},
{
"cve": "CVE-2021-47334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47334"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47334",
"url": "https://www.suse.com/security/cve/CVE-2021-47334"
},
{
"category": "external",
"summary": "SUSE Bug 1225112 for CVE-2021-47334",
"url": "https://bugzilla.suse.com/1225112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47334"
},
{
"cve": "CVE-2021-47337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix bad pointer dereference when ehandler kthread is invalid\n\nCommit 66a834d09293 (\"scsi: core: Fix error handling of scsi_host_alloc()\")\nchanged the allocation logic to call put_device() to perform host cleanup\nwith the assumption that IDA removal and stopping the kthread would\nproperly be performed in scsi_host_dev_release(). However, in the unlikely\ncase that the error handler thread fails to spawn, shost-\u003eehandler is set\nto ERR_PTR(-ENOMEM).\n\nThe error handler cleanup code in scsi_host_dev_release() will call\nkthread_stop() if shost-\u003eehandler != NULL which will always be the case\nwhether the kthread was successfully spawned or not. In the case that it\nfailed to spawn this has the nasty side effect of trying to dereference an\ninvalid pointer when kthread_stop() is called. The following splat provides\nan example of this behavior in the wild:\n\nscsi host11: error handler thread failed to spawn, error = -4\nKernel attempted to read user page (10c) - exploit attempt? (uid: 0)\nBUG: Kernel NULL pointer dereference on read at 0x0000010c\nFaulting instruction address: 0xc00000000818e9a8\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region\n hash dm_log dm_mod fuse overlay squashfs loop\nCPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1\nNIP: c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8\nREGS: c000000037d12ea0 TRAP: 0300 Not tainted (5.13.0-rc7)\nMSR: 800000000280b033 \u0026lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u0026gt; CR: 28228228\nXER: 20040001\nCFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0\nGPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc\nGPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000\nGPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff\nGPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0\nGPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288\nGPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898\nGPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000\nGPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc\nNIP [c00000000818e9a8] kthread_stop+0x38/0x230\nLR [c0000000089846e8] scsi_host_dev_release+0x98/0x160\nCall Trace:\n[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)\n[c0000000089846e8] scsi_host_dev_release+0x98/0x160\n[c00000000891e960] device_release+0x60/0x100\n[c0000000087e55c4] kobject_release+0x84/0x210\n[c00000000891ec78] put_device+0x28/0x40\n[c000000008984ea4] scsi_host_alloc+0x314/0x430\n[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]\n[c000000008110104] vio_bus_probe+0xa4/0x4b0\n[c00000000892a860] really_probe+0x140/0x680\n[c00000000892aefc] driver_probe_device+0x15c/0x200\n[c00000000892b63c] device_driver_attach+0xcc/0xe0\n[c00000000892b740] __driver_attach+0xf0/0x200\n[c000000008926f28] bus_for_each_dev+0xa8/0x130\n[c000000008929ce4] driver_attach+0x34/0x50\n[c000000008928fc0] bus_add_driver+0x1b0/0x300\n[c00000000892c798] driver_register+0x98/0x1a0\n[c00000000810eb60] __vio_register_driver+0x80/0xe0\n[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]\n[c0000000080121d0] do_one_initcall+0x60/0x2d0\n[c000000008261abc] do_init_module+0x7c/0x320\n[c000000008265700] load_module+0x2350/0x25b0\n[c000000008265cb4] __do_sys_finit_module+0xd4/0x160\n[c000000008031110] system_call_exception+0x150/0x2d0\n[c00000000800d35c] system_call_common+0xec/0x278\n\nFix this be nulling shost-\u003eehandler when the kthread fails to spawn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47337",
"url": "https://www.suse.com/security/cve/CVE-2021-47337"
},
{
"category": "external",
"summary": "SUSE Bug 1224926 for CVE-2021-47337",
"url": "https://bugzilla.suse.com/1224926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47337"
},
{
"cve": "CVE-2021-47343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: assign new_root only when removal succeeds\n\nremove_raw() in dm_btree_remove() may fail due to IO read error\n(e.g. read the content of origin block fails during shadowing),\nand the value of shadow_spine::root is uninitialized, but\nthe uninitialized value is still assign to new_root in the\nend of dm_btree_remove().\n\nFor dm-thin, the value of pmd-\u003edetails_root or pmd-\u003eroot will become\nan uninitialized value, so if trying to read details_info tree again\nout-of-bound memory may occur as showed below:\n\n general protection fault, probably for non-canonical address 0x3fdcb14c8d7520\n CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6\n Hardware name: QEMU Standard PC\n RIP: 0010:metadata_ll_load_ie+0x14/0x30\n Call Trace:\n sm_metadata_count_is_more_than_one+0xb9/0xe0\n dm_tm_shadow_block+0x52/0x1c0\n shadow_step+0x59/0xf0\n remove_raw+0xb2/0x170\n dm_btree_remove+0xf4/0x1c0\n dm_pool_delete_thin_device+0xc3/0x140\n pool_message+0x218/0x2b0\n target_message+0x251/0x290\n ctl_ioctl+0x1c4/0x4d0\n dm_ctl_ioctl+0xe/0x20\n __x64_sys_ioctl+0x7b/0xb0\n do_syscall_64+0x40/0xb0\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFixing it by only assign new_root when removal succeeds",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47343",
"url": "https://www.suse.com/security/cve/CVE-2021-47343"
},
{
"category": "external",
"summary": "SUSE Bug 1225155 for CVE-2021-47343",
"url": "https://bugzilla.suse.com/1225155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47343"
},
{
"cve": "CVE-2021-47344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47344"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: zr364xx: fix memory leak in zr364xx_start_readpipe\n\nsyzbot reported memory leak in zr364xx driver.\nThe problem was in non-freed urb in case of\nusb_submit_urb() fail.\n\nbacktrace:\n [\u003cffffffff82baedf6\u003e] kmalloc include/linux/slab.h:561 [inline]\n [\u003cffffffff82baedf6\u003e] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74\n [\u003cffffffff82f7cce8\u003e] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022\n [\u003cffffffff84251dfc\u003e] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]\n [\u003cffffffff84251dfc\u003e] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516\n [\u003cffffffff82bb6507\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [\u003cffffffff826018a9\u003e] really_probe+0x159/0x500 drivers/base/dd.c:576",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47344",
"url": "https://www.suse.com/security/cve/CVE-2021-47344"
},
{
"category": "external",
"summary": "SUSE Bug 1224922 for CVE-2021-47344",
"url": "https://bugzilla.suse.com/1224922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47344"
},
{
"cve": "CVE-2021-47345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47345"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix rdma_resolve_route() memory leak\n\nFix a memory leak when \"mda_resolve_route() is called more than once on\nthe same \"rdma_cm_id\".\n\nThis is possible if cma_query_handler() triggers the\nRDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and\nallows rdma_resolve_route() to be called again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47345",
"url": "https://www.suse.com/security/cve/CVE-2021-47345"
},
{
"category": "external",
"summary": "SUSE Bug 1225157 for CVE-2021-47345",
"url": "https://bugzilla.suse.com/1225157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47345"
},
{
"cve": "CVE-2021-47347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47347"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47347",
"url": "https://www.suse.com/security/cve/CVE-2021-47347"
},
{
"category": "external",
"summary": "SUSE Bug 1225177 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "external",
"summary": "SUSE Bug 1225305 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47347"
},
{
"cve": "CVE-2021-47352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47352"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47352",
"url": "https://www.suse.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "SUSE Bug 1225124 for CVE-2021-47352",
"url": "https://bugzilla.suse.com/1225124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47352"
},
{
"cve": "CVE-2021-47353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47353"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47353",
"url": "https://www.suse.com/security/cve/CVE-2021-47353"
},
{
"category": "external",
"summary": "SUSE Bug 1225128 for CVE-2021-47353",
"url": "https://bugzilla.suse.com/1225128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47353"
},
{
"cve": "CVE-2021-47355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: nicstar: Fix possible use-after-free in nicstar_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47355",
"url": "https://www.suse.com/security/cve/CVE-2021-47355"
},
{
"category": "external",
"summary": "SUSE Bug 1225141 for CVE-2021-47355",
"url": "https://bugzilla.suse.com/1225141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47355"
},
{
"cve": "CVE-2021-47356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47356",
"url": "https://www.suse.com/security/cve/CVE-2021-47356"
},
{
"category": "external",
"summary": "SUSE Bug 1225143 for CVE-2021-47356",
"url": "https://bugzilla.suse.com/1225143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47356"
},
{
"cve": "CVE-2021-47357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47357"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47357",
"url": "https://www.suse.com/security/cve/CVE-2021-47357"
},
{
"category": "external",
"summary": "SUSE Bug 1225144 for CVE-2021-47357",
"url": "https://bugzilla.suse.com/1225144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47357"
},
{
"cve": "CVE-2021-47361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n but we haven\u0027t yet called get_device(carrier) and probably that\n leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n release the bus. This will free the internal resources tied to the\n device and call mcb_free_bus() which will free the rest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47361",
"url": "https://www.suse.com/security/cve/CVE-2021-47361"
},
{
"category": "external",
"summary": "SUSE Bug 1225151 for CVE-2021-47361",
"url": "https://bugzilla.suse.com/1225151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2021-47362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47362"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state\u0027s link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47362",
"url": "https://www.suse.com/security/cve/CVE-2021-47362"
},
{
"category": "external",
"summary": "SUSE Bug 1225153 for CVE-2021-47362",
"url": "https://bugzilla.suse.com/1225153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47362"
},
{
"cve": "CVE-2021-47369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47369"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card-\u003eqdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue-\u003ebufs[i].pool_entry scribbles all over the CPU\u0027s lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren\u0027t allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card-\u003eqdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens \u003chca@linux.ibm.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47369",
"url": "https://www.suse.com/security/cve/CVE-2021-47369"
},
{
"category": "external",
"summary": "SUSE Bug 1225164 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "external",
"summary": "SUSE Bug 1227324 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1227324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47369"
},
{
"cve": "CVE-2021-47375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47375"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 \u003e /sys/block/sdb/trace/enable\n\t\t\t blk_trace_remove_queue\n\t\t\t synchronize_rcu\n\t\t\t blk_trace_free\n\t\t\t relay_close\nrcu_read_lock\n__blk_add_trace\n trace_note_tsk\n (Iterate running_trace_list)\n\t\t\t relay_close_buf\n\t\t\t\t relay_destroy_buf\n\t\t\t\t kfree(buf)\n trace_note(sdb\u0027s bt)\n relay_reserve\n buf-\u003eoffset \u003c- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[ 502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[ 502.715260] #PF: supervisor read access in kernel mode\n[ 502.715903] #PF: error_code(0x0000) - not-present page\n[ 502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[ 502.717252] Oops: 0000 [#1] SMP\n[ 502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[ 502.732872] Call Trace:\n[ 502.733193] __blk_add_trace.cold+0x137/0x1a3\n[ 502.733734] blk_add_trace_rq+0x7b/0xd0\n[ 502.734207] blk_add_trace_rq_issue+0x54/0xa0\n[ 502.734755] blk_mq_start_request+0xde/0x1b0\n[ 502.735287] scsi_queue_rq+0x528/0x1140\n...\n[ 502.742704] sg_new_write.isra.0+0x16e/0x3e0\n[ 502.747501] sg_ioctl+0x466/0x1100\n\nReproduce method:\n ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sda, BLKTRACESTART)\n ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sdb, BLKTRACESTART)\n\n echo 0 \u003e /sys/block/sdb/trace/enable \u0026\n // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n ioctl$SG_IO(/dev/sda, SG_IO, ...)\n // Enters trace_note_tsk() after blk_trace_free() returned\n // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47375",
"url": "https://www.suse.com/security/cve/CVE-2021-47375"
},
{
"category": "external",
"summary": "SUSE Bug 1225193 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "external",
"summary": "SUSE Bug 1225194 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47375"
},
{
"cve": "CVE-2021-47378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47378"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don\u0027t destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47378",
"url": "https://www.suse.com/security/cve/CVE-2021-47378"
},
{
"category": "external",
"summary": "SUSE Bug 1225201 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "external",
"summary": "SUSE Bug 1225202 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47378"
},
{
"cve": "CVE-2021-47382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47382"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47382",
"url": "https://www.suse.com/security/cve/CVE-2021-47382"
},
{
"category": "external",
"summary": "SUSE Bug 1225207 for CVE-2021-47382",
"url": "https://bugzilla.suse.com/1225207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47382"
},
{
"cve": "CVE-2021-47383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47383",
"url": "https://www.suse.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "SUSE Bug 1225208 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "external",
"summary": "SUSE Bug 1225211 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47391"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n CPU 1 CPU 2\n\nrdma_resolve_addr():\n RDMA_CM_IDLE -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler) #1\n\n\t\t\t process_one_req(): for #1\n addr_handler():\n RDMA_CM_ADDR_QUERY -\u003e RDMA_CM_ADDR_BOUND\n mutex_unlock(\u0026id_priv-\u003ehandler_mutex);\n [.. handler still running ..]\n\nrdma_resolve_addr():\n RDMA_CM_ADDR_BOUND -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler)\n !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n _destroy_id():\n cma_cancel_operation():\n rdma_addr_cancel()\n\n // process_one_req() self removes it\n\t\t spin_lock_bh(\u0026lock);\n cancel_delayed_work(\u0026req-\u003ework);\n\t if (!list_empty(\u0026req-\u003elist)) == true\n\n ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n addr_handler():\n\t mutex_lock(\u0026id_priv-\u003ehandler_mutex);\n !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn\u0027t cost anything in the normal flow\nthat never uses this strange error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47391",
"url": "https://www.suse.com/security/cve/CVE-2021-47391"
},
{
"category": "external",
"summary": "SUSE Bug 1225318 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "external",
"summary": "SUSE Bug 1225319 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47391"
},
{
"cve": "CVE-2021-47397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47397"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer\u0027s return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n Call Trace:\n \u003cIRQ\u003e\n sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n dst_input include/net/dst.h:460 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47397",
"url": "https://www.suse.com/security/cve/CVE-2021-47397"
},
{
"category": "external",
"summary": "SUSE Bug 1225082 for CVE-2021-47397",
"url": "https://bugzilla.suse.com/1225082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47397"
},
{
"cve": "CVE-2021-47400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47400"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G O 5.14.0-rc4+ #1\n[ 3078.269102] Hardware name: , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w 3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517] napi_enable+0x80/0x84\n[ 3078.424626] hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469] hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430] hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511] hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879] hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470] hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675] process_one_work+0x1dc/0x48c\n[ 3078.481888] worker_thread+0x15c/0x464\n[ 3078.487104] kthread+0x160/0x170\n[ 3078.492479] ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47400",
"url": "https://www.suse.com/security/cve/CVE-2021-47400"
},
{
"category": "external",
"summary": "SUSE Bug 1225329 for CVE-2021-47400",
"url": "https://bugzilla.suse.com/1225329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47400"
},
{
"cve": "CVE-2021-47401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47401",
"url": "https://www.suse.com/security/cve/CVE-2021-47401"
},
{
"category": "external",
"summary": "SUSE Bug 1225242 for CVE-2021-47401",
"url": "https://bugzilla.suse.com/1225242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47401"
},
{
"cve": "CVE-2021-47404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47404"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device\u0027s input is non empty before it\u0027s been used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47404",
"url": "https://www.suse.com/security/cve/CVE-2021-47404"
},
{
"category": "external",
"summary": "SUSE Bug 1225303 for CVE-2021-47404",
"url": "https://bugzilla.suse.com/1225303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47404"
},
{
"cve": "CVE-2021-47409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47409"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47409",
"url": "https://www.suse.com/security/cve/CVE-2021-47409"
},
{
"category": "external",
"summary": "SUSE Bug 1225330 for CVE-2021-47409",
"url": "https://bugzilla.suse.com/1225330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47409"
},
{
"cve": "CVE-2021-47416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47416"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus-\u003estate to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47416",
"url": "https://www.suse.com/security/cve/CVE-2021-47416"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "external",
"summary": "SUSE Bug 1225336 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47416"
},
{
"cve": "CVE-2021-47423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47423"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the \u0027op\u0027 allocated in single_open() will be leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47423",
"url": "https://www.suse.com/security/cve/CVE-2021-47423"
},
{
"category": "external",
"summary": "SUSE Bug 1225366 for CVE-2021-47423",
"url": "https://bugzilla.suse.com/1225366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47423"
},
{
"cve": "CVE-2021-47424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47424"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n Trying to free already-free IRQ 266\n WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n Workqueue: events work_for_cpu_fn\n RIP: 0010:__free_irq+0x9a/0x300\n Call Trace:\n ? synchronize_irq+0x3a/0xa0\n free_irq+0x2e/0x60\n i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n i40e_probe.part.108+0x134b/0x1a40 [i40e]\n ? kmem_cache_alloc+0x158/0x1c0\n ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n ? acpi_ut_update_object_reference+0x15e/0x1e2\n ? strstr+0x21/0x70\n ? irq_get_irq_data+0xa/0x20\n ? mp_check_pin_attr+0x13/0xc0\n ? irq_get_irq_data+0xa/0x20\n ? mp_map_pin_to_irq+0xd3/0x2f0\n ? acpi_register_gsi_ioapic+0x93/0x170\n ? pci_conf1_read+0xa4/0x100\n ? pci_bus_read_config_word+0x49/0x70\n ? do_pci_enable_device+0xcc/0x100\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x112/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47424",
"url": "https://www.suse.com/security/cve/CVE-2021-47424"
},
{
"category": "external",
"summary": "SUSE Bug 1225367 for CVE-2021-47424",
"url": "https://bugzilla.suse.com/1225367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47424"
},
{
"cve": "CVE-2021-47431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47431"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn\u0027t called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47431",
"url": "https://www.suse.com/security/cve/CVE-2021-47431"
},
{
"category": "external",
"summary": "SUSE Bug 1225390 for CVE-2021-47431",
"url": "https://bugzilla.suse.com/1225390"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47431"
},
{
"cve": "CVE-2021-47435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47435",
"url": "https://www.suse.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "SUSE Bug 1225247 for CVE-2021-47435",
"url": "https://bugzilla.suse.com/1225247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47435"
},
{
"cve": "CVE-2021-47436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n-\u003eenable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47436",
"url": "https://www.suse.com/security/cve/CVE-2021-47436"
},
{
"category": "external",
"summary": "SUSE Bug 1225244 for CVE-2021-47436",
"url": "https://bugzilla.suse.com/1225244"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47436"
},
{
"cve": "CVE-2021-47456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing \u0027chan\u0027 again after\nreleasing \u0027dev\u0027 will cause UAF.\n\nFix this by releasing \u0027dev\u0027 later.\n\nThe following log reveals it:\n\n[ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[ 35.965513 ] Call Trace:\n[ 35.965718 ] dump_stack_lvl+0xa8/0xd1\n[ 35.966028 ] print_address_description+0x87/0x3b0\n[ 35.966420 ] kasan_report+0x172/0x1c0\n[ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170\n[ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967945 ] __asan_report_load8_noabort+0x14/0x20\n[ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.968752 ] pci_device_remove+0xa9/0x250",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47456",
"url": "https://www.suse.com/security/cve/CVE-2021-47456"
},
{
"category": "external",
"summary": "SUSE Bug 1225256 for CVE-2021-47456",
"url": "https://bugzilla.suse.com/1225256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47456"
},
{
"cve": "CVE-2021-47458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47458"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below. Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated. This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n detected buffer overflow in strlen\n ------------[ cut here ]------------\n kernel BUG at lib/string.c:1149!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n Debian 5.14.6-2\n RIP: 0010:fortify_panic+0xf/0x11\n ...\n Call Trace:\n ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n mount_bdev+0x185/0x1b0\n legacy_get_tree+0x27/0x40\n vfs_get_tree+0x25/0xb0\n path_mount+0x454/0xa20\n __x64_sys_mount+0x103/0x140\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47458",
"url": "https://www.suse.com/security/cve/CVE-2021-47458"
},
{
"category": "external",
"summary": "SUSE Bug 1225252 for CVE-2021-47458",
"url": "https://bugzilla.suse.com/1225252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47458"
},
{
"cve": "CVE-2021-47460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47460"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don\u0027t invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster. However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty. So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean. So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n\u0027ocfs2_file\u0027 has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47460",
"url": "https://www.suse.com/security/cve/CVE-2021-47460"
},
{
"category": "external",
"summary": "SUSE Bug 1225251 for CVE-2021-47460",
"url": "https://bugzilla.suse.com/1225251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47460"
},
{
"cve": "CVE-2021-47469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47469"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47469",
"url": "https://www.suse.com/security/cve/CVE-2021-47469"
},
{
"category": "external",
"summary": "SUSE Bug 1225347 for CVE-2021-47469",
"url": "https://bugzilla.suse.com/1225347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47469"
},
{
"cve": "CVE-2021-47472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47472"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47472",
"url": "https://www.suse.com/security/cve/CVE-2021-47472"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47472",
"url": "https://bugzilla.suse.com/1225189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47472"
},
{
"cve": "CVE-2021-47473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47473"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n bsg_job-\u003erequest-\u003emsgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47473",
"url": "https://www.suse.com/security/cve/CVE-2021-47473"
},
{
"category": "external",
"summary": "SUSE Bug 1225192 for CVE-2021-47473",
"url": "https://bugzilla.suse.com/1225192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2021-47473"
},
{
"cve": "CVE-2021-47478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47478",
"url": "https://www.suse.com/security/cve/CVE-2021-47478"
},
{
"category": "external",
"summary": "SUSE Bug 1225198 for CVE-2021-47478",
"url": "https://bugzilla.suse.com/1225198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47478"
},
{
"cve": "CVE-2021-47480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47480"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won\u0027t be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of \u0027BUG: unable to handle page fault for address\u0027\nreported by Changhui and Yi.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47480",
"url": "https://www.suse.com/security/cve/CVE-2021-47480"
},
{
"category": "external",
"summary": "SUSE Bug 1225322 for CVE-2021-47480",
"url": "https://bugzilla.suse.com/1225322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47480"
},
{
"cve": "CVE-2021-47483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47483"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when \u0027present\u0027 realloc failed,\nthe \u0027blk\u0027 which is supposed to assign to \u0027rbnode-\u003eblock\u0027 will be freed,\nso \u0027rbnode-\u003eblock\u0027 points a freed memory, in the error handling path of\nregcache_rbtree_init(), \u0027rbnode-\u003eblock\u0027 will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode-\u003eblock to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47483",
"url": "https://www.suse.com/security/cve/CVE-2021-47483"
},
{
"category": "external",
"summary": "SUSE Bug 1224907 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "external",
"summary": "SUSE Bug 1224908 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47483"
},
{
"cve": "CVE-2021-47485",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47485"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47485",
"url": "https://www.suse.com/security/cve/CVE-2021-47485"
},
{
"category": "external",
"summary": "SUSE Bug 1224904 for CVE-2021-47485",
"url": "https://bugzilla.suse.com/1224904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47485"
},
{
"cve": "CVE-2021-47495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47495"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47495",
"url": "https://www.suse.com/security/cve/CVE-2021-47495"
},
{
"category": "external",
"summary": "SUSE Bug 1225351 for CVE-2021-47495",
"url": "https://bugzilla.suse.com/1225351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47495"
},
{
"cve": "CVE-2021-47496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47496"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk-\u003esk_err appears to expect a positive value, a convention that ktls\ndoesn\u0027t always follow and that leads to memory corruption in other code.\nFor instance,\n\n [kworker]\n tls_encrypt_done(..., err=\u003cnegative error from crypto request\u003e)\n tls_err_abort(.., err)\n sk-\u003esk_err = err;\n\n [task]\n splice_from_pipe_feed\n ...\n tls_sw_do_sendpage\n if (sk-\u003esk_err) {\n ret = -sk-\u003esk_err; // ret is positive\n\n splice_from_pipe_feed (continued)\n ret = actor(...) // ret is still positive and interpreted as bytes\n // written, resulting in underflow of buf-\u003elen and\n // sd-\u003elen, leading to huge buf-\u003eoffset and bogus\n // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47496",
"url": "https://www.suse.com/security/cve/CVE-2021-47496"
},
{
"category": "external",
"summary": "SUSE Bug 1225354 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "external",
"summary": "SUSE Bug 1227656 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1227656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47496"
},
{
"cve": "CVE-2021-47497",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47497"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47497",
"url": "https://www.suse.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "SUSE Bug 1225355 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "external",
"summary": "SUSE Bug 1227655 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1227655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47497"
},
{
"cve": "CVE-2021-47500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47500",
"url": "https://www.suse.com/security/cve/CVE-2021-47500"
},
{
"category": "external",
"summary": "SUSE Bug 1225360 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "external",
"summary": "SUSE Bug 1227698 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1227698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47500"
},
{
"cve": "CVE-2021-47506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47506",
"url": "https://www.suse.com/security/cve/CVE-2021-47506"
},
{
"category": "external",
"summary": "SUSE Bug 1225404 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "external",
"summary": "SUSE Bug 1227497 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1227497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47506"
},
{
"cve": "CVE-2021-47509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47509"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47509",
"url": "https://www.suse.com/security/cve/CVE-2021-47509"
},
{
"category": "external",
"summary": "SUSE Bug 1225409 for CVE-2021-47509",
"url": "https://bugzilla.suse.com/1225409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47509"
},
{
"cve": "CVE-2021-47511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47511"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t. Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47511",
"url": "https://www.suse.com/security/cve/CVE-2021-47511"
},
{
"category": "external",
"summary": "SUSE Bug 1225411 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "external",
"summary": "SUSE Bug 1227700 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1227700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47511"
},
{
"cve": "CVE-2021-47523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47523"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd-\u003ercvhdrtail_dummy_kvaddr = dma_alloc_coherent(\u0026dd-\u003epcidev-\u003edev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t \u0026dd-\u003ercvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd-\u003ercvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47523",
"url": "https://www.suse.com/security/cve/CVE-2021-47523"
},
{
"category": "external",
"summary": "SUSE Bug 1225438 for CVE-2021-47523",
"url": "https://bugzilla.suse.com/1225438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47523"
},
{
"cve": "CVE-2021-47541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp-\u003etx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof \u0026tmp-\u003etx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47541",
"url": "https://www.suse.com/security/cve/CVE-2021-47541"
},
{
"category": "external",
"summary": "SUSE Bug 1225453 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "external",
"summary": "SUSE Bug 1225454 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2021-47541"
},
{
"cve": "CVE-2021-47548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47548"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port \u003e= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47548",
"url": "https://www.suse.com/security/cve/CVE-2021-47548"
},
{
"category": "external",
"summary": "SUSE Bug 1225506 for CVE-2021-47548",
"url": "https://bugzilla.suse.com/1225506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47565"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost\u0027s sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47565",
"url": "https://www.suse.com/security/cve/CVE-2021-47565"
},
{
"category": "external",
"summary": "SUSE Bug 1225384 for CVE-2021-47565",
"url": "https://bugzilla.suse.com/1225384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2021-47565"
},
{
"cve": "CVE-2022-48636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48636",
"url": "https://www.suse.com/security/cve/CVE-2022-48636"
},
{
"category": "external",
"summary": "SUSE Bug 1223512 for CVE-2022-48636",
"url": "https://bugzilla.suse.com/1223512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48636"
},
{
"cve": "CVE-2022-48650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48650"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48650",
"url": "https://www.suse.com/security/cve/CVE-2022-48650"
},
{
"category": "external",
"summary": "SUSE Bug 1223509 for CVE-2022-48650",
"url": "https://bugzilla.suse.com/1223509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48650"
},
{
"cve": "CVE-2022-48672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48672"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48672",
"url": "https://www.suse.com/security/cve/CVE-2022-48672"
},
{
"category": "external",
"summary": "SUSE Bug 1223931 for CVE-2022-48672",
"url": "https://bugzilla.suse.com/1223931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48672"
},
{
"cve": "CVE-2022-48686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48686",
"url": "https://www.suse.com/security/cve/CVE-2022-48686"
},
{
"category": "external",
"summary": "SUSE Bug 1223948 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "external",
"summary": "SUSE Bug 1226337 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1226337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2022-48686"
},
{
"cve": "CVE-2022-48697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48697"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48697",
"url": "https://www.suse.com/security/cve/CVE-2022-48697"
},
{
"category": "external",
"summary": "SUSE Bug 1223922 for CVE-2022-48697",
"url": "https://bugzilla.suse.com/1223922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48697"
},
{
"cve": "CVE-2022-48702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48702"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48702",
"url": "https://www.suse.com/security/cve/CVE-2022-48702"
},
{
"category": "external",
"summary": "SUSE Bug 1223923 for CVE-2022-48702",
"url": "https://bugzilla.suse.com/1223923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48702"
},
{
"cve": "CVE-2022-48704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48704"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e] ra = [\u003cffffffff81240844\u003e] ps = 0000 Tainted: G W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000\nt2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258\nt5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000\ns0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018\ns3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008\na3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338\nt8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800\nt11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000\ngp = ffffffff81d89690 sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48704",
"url": "https://www.suse.com/security/cve/CVE-2022-48704"
},
{
"category": "external",
"summary": "SUSE Bug 1223932 for CVE-2022-48704",
"url": "https://bugzilla.suse.com/1223932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48704"
},
{
"cve": "CVE-2022-48708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48708"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48708",
"url": "https://www.suse.com/security/cve/CVE-2022-48708"
},
{
"category": "external",
"summary": "SUSE Bug 1224942 for CVE-2022-48708",
"url": "https://bugzilla.suse.com/1224942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48708"
},
{
"cve": "CVE-2022-48710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48710",
"url": "https://www.suse.com/security/cve/CVE-2022-48710"
},
{
"category": "external",
"summary": "SUSE Bug 1225230 for CVE-2022-48710",
"url": "https://bugzilla.suse.com/1225230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-48710"
},
{
"cve": "CVE-2023-0160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0160"
}
],
"notes": [
{
"category": "general",
"text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0160",
"url": "https://www.suse.com/security/cve/CVE-2023-0160"
},
{
"category": "external",
"summary": "SUSE Bug 1209657 for CVE-2023-0160",
"url": "https://bugzilla.suse.com/1209657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-0160"
},
{
"cve": "CVE-2023-1829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1829"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1829",
"url": "https://www.suse.com/security/cve/CVE-2023-1829"
},
{
"category": "external",
"summary": "SUSE Bug 1210335 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "external",
"summary": "SUSE Bug 1210619 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210619"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1220886 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1220886"
},
{
"category": "external",
"summary": "SUSE Bug 1228311 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1228311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-42755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42755"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42755",
"url": "https://www.suse.com/security/cve/CVE-2023-42755"
},
{
"category": "external",
"summary": "SUSE Bug 1215702 for CVE-2023-42755",
"url": "https://bugzilla.suse.com/1215702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-47233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-47233"
}
],
"notes": [
{
"category": "general",
"text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-47233",
"url": "https://www.suse.com/security/cve/CVE-2023-47233"
},
{
"category": "external",
"summary": "SUSE Bug 1216702 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-52527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don\u0027t want to repeat the\ntransport header or account for it twice. This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff. The warning occurs when \u0027copy\u0027 is larger than\nthe amount of data in the message iterator. This is because the requested\nlength includes the transport header length when it shouldn\u0027t. This can be\ntriggered by, for example:\n\n sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n bind(sfd, ...); // ::1\n connect(sfd, ...); // ::1 port 7\n send(sfd, buffer, 4100, MSG_MORE);\n sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won\u0027t suffer from this problem as it builds\nthe UDP packet itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52527",
"url": "https://www.suse.com/security/cve/CVE-2023-52527"
},
{
"category": "external",
"summary": "SUSE Bug 1220928 for CVE-2023-52527",
"url": "https://bugzilla.suse.com/1220928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n parameter of dpu_encoder_phys.\n -Switch from atomic refcnt to a simple int counter as mutex has\n now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52586",
"url": "https://www.suse.com/security/cve/CVE-2023-52586"
},
{
"category": "external",
"summary": "SUSE Bug 1221081 for CVE-2023-52586",
"url": "https://bugzilla.suse.com/1221081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52591",
"url": "https://www.suse.com/security/cve/CVE-2023-52591"
},
{
"category": "external",
"summary": "SUSE Bug 1221044 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52646"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm-\u003eioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52646",
"url": "https://www.suse.com/security/cve/CVE-2023-52646"
},
{
"category": "external",
"summary": "SUSE Bug 1223432 for CVE-2023-52646",
"url": "https://bugzilla.suse.com/1223432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52653"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx-\u003emech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52653",
"url": "https://www.suse.com/security/cve/CVE-2023-52653"
},
{
"category": "external",
"summary": "SUSE Bug 1223712 for CVE-2023-52653",
"url": "https://bugzilla.suse.com/1223712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52655"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52655",
"url": "https://www.suse.com/security/cve/CVE-2023-52655"
},
{
"category": "external",
"summary": "SUSE Bug 1217169 for CVE-2023-52655",
"url": "https://bugzilla.suse.com/1217169"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52664"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52664",
"url": "https://www.suse.com/security/cve/CVE-2023-52664"
},
{
"category": "external",
"summary": "SUSE Bug 1224747 for CVE-2023-52664",
"url": "https://bugzilla.suse.com/1224747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52685"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52685",
"url": "https://www.suse.com/security/cve/CVE-2023-52685"
},
{
"category": "external",
"summary": "SUSE Bug 1224728 for CVE-2023-52685",
"url": "https://bugzilla.suse.com/1224728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52686",
"url": "https://www.suse.com/security/cve/CVE-2023-52686"
},
{
"category": "external",
"summary": "SUSE Bug 1224682 for CVE-2023-52686",
"url": "https://bugzilla.suse.com/1224682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52691"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev-\u003epm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52691",
"url": "https://www.suse.com/security/cve/CVE-2023-52691"
},
{
"category": "external",
"summary": "SUSE Bug 1224607 for CVE-2023-52691",
"url": "https://bugzilla.suse.com/1224607"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52696"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52696",
"url": "https://www.suse.com/security/cve/CVE-2023-52696"
},
{
"category": "external",
"summary": "SUSE Bug 1224601 for CVE-2023-52696",
"url": "https://bugzilla.suse.com/1224601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52698"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -\u003e netlbl_calipso_ops_register() function isn\u0027t called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn\u0027t free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n hex dump (first 32 bytes):\n 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c...\u003e] kmalloc include/linux/slab.h:552 [inline]\n [\u003c...\u003e] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n [\u003c...\u003e] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n [\u003c...\u003e] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n [\u003c...\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n [\u003c...\u003e] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n [\u003c...\u003e] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n [\u003c...\u003e] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n [\u003c...\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n [\u003c...\u003e] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n [\u003c...\u003e] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n [\u003c...\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n [\u003c...\u003e] sock_sendmsg+0x157/0x190 net/socket.c:671\n [\u003c...\u003e] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n [\u003c...\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n [\u003c...\u003e] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n [\u003c...\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n [\u003c...\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52698",
"url": "https://www.suse.com/security/cve/CVE-2023-52698"
},
{
"category": "external",
"summary": "SUSE Bug 1224621 for CVE-2023-52698",
"url": "https://bugzilla.suse.com/1224621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52703"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don\u0027t pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it\u0027s pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let\u0027s just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52703",
"url": "https://www.suse.com/security/cve/CVE-2023-52703"
},
{
"category": "external",
"summary": "SUSE Bug 1225549 for CVE-2023-52703",
"url": "https://bugzilla.suse.com/1225549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n hex dump (first 32 bytes):\n 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X......\n 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n hex dump (first 32 bytes):\n 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X......\n 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52730",
"url": "https://www.suse.com/security/cve/CVE-2023-52730"
},
{
"category": "external",
"summary": "SUSE Bug 1224956 for CVE-2023-52730",
"url": "https://bugzilla.suse.com/1224956"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don\u0027t know what exactly has\nhappened in MDS side. And we shouldn\u0027t continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52732",
"url": "https://www.suse.com/security/cve/CVE-2023-52732"
},
{
"category": "external",
"summary": "SUSE Bug 1225222 for CVE-2023-52732",
"url": "https://bugzilla.suse.com/1225222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52741"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata-\u003eread_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x38/0x4c\n print_report+0x16f/0x4a6\n kasan_report+0xb7/0x130\n readpages_fill_pages+0x14c/0x7e0\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n \u003c/TASK\u003e\n\n Allocated by task 2535:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x82/0x90\n cifs_readdata_direct_alloc+0x2c/0x110\n cifs_readdata_alloc+0x2d/0x60\n cifs_readahead+0x393/0xfe0\n read_pages+0x12f/0x470\n page_cache_ra_unbounded+0x1b1/0x240\n filemap_get_pages+0x1c8/0x9a0\n filemap_read+0x1c0/0x540\n cifs_strict_readv+0x21b/0x240\n vfs_read+0x395/0x4b0\n ksys_read+0xb8/0x150\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 79:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2e/0x50\n __kasan_slab_free+0x10e/0x1a0\n __kmem_cache_free+0x7a/0x1a0\n cifs_readdata_release+0x49/0x60\n process_one_work+0x46c/0x760\n worker_thread+0x2a4/0x6f0\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\n Last potentially related work creation:\n kasan_save_stack+0x22/0x50\n __kasan_record_aux_stack+0x95/0xb0\n insert_work+0x2b/0x130\n __queue_work+0x1fe/0x660\n queue_work_on+0x4b/0x60\n smb2_readv_callback+0x396/0x800\n cifs_abort_connection+0x474/0x6a0\n cifs_reconnect+0x5cb/0xa50\n cifs_readv_from_socket.cold+0x22/0x6c\n cifs_read_page_from_socket+0xc1/0x100\n readpages_fill_pages.cold+0x2f/0x46\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n cifs_readv_from_socket\n cifs_reconnect\n __cifs_reconnect\n cifs_abort_connection\n mid-\u003ecallback() --\u003e smb2_readv_callback\n queue_work(\u0026rdata-\u003ework) # if the worker completes first,\n # the rdata is freed\n cifs_readv_complete\n kref_put\n cifs_readdata_release\n kfree(rdata)\n return rdata-\u003e... # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52741",
"url": "https://www.suse.com/security/cve/CVE-2023-52741"
},
{
"category": "external",
"summary": "SUSE Bug 1225479 for CVE-2023-52741",
"url": "https://bugzilla.suse.com/1225479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52742"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite. In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn\u0027t match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52742",
"url": "https://www.suse.com/security/cve/CVE-2023-52742"
},
{
"category": "external",
"summary": "SUSE Bug 1225482 for CVE-2023-52742",
"url": "https://bugzilla.suse.com/1225482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52747",
"url": "https://www.suse.com/security/cve/CVE-2023-52747"
},
{
"category": "external",
"summary": "SUSE Bug 1224931 for CVE-2023-52747",
"url": "https://bugzilla.suse.com/1224931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52759"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52759",
"url": "https://www.suse.com/security/cve/CVE-2023-52759"
},
{
"category": "external",
"summary": "SUSE Bug 1225560 for CVE-2023-52759",
"url": "https://bugzilla.suse.com/1225560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52774"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52774",
"url": "https://www.suse.com/security/cve/CVE-2023-52774"
},
{
"category": "external",
"summary": "SUSE Bug 1225572 for CVE-2023-52774",
"url": "https://bugzilla.suse.com/1225572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52781"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52781",
"url": "https://www.suse.com/security/cve/CVE-2023-52781"
},
{
"category": "external",
"summary": "SUSE Bug 1225092 for CVE-2023-52781",
"url": "https://bugzilla.suse.com/1225092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52796"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 \u003c41\u003e 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003c#DF\u003e\n\u003c/#DF\u003e\n\u003cTASK\u003e\n[\u003cffffffff81f281d1\u003e] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[\u003cffffffff817e5bf2\u003e] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[\u003cffffffff817e5bf2\u003e] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[\u003cffffffff817e5bf2\u003e] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[\u003cffffffff817e5bf2\u003e] cpu_online include/linux/cpumask.h:1092 [inline]\n[\u003cffffffff817e5bf2\u003e] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[\u003cffffffff817e5bf2\u003e] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[\u003cffffffff8563221e\u003e] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[\u003cffffffff8561464d\u003e] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[\u003cffffffff8561464d\u003e] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[\u003cffffffff85618120\u003e] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[\u003cffffffff856f65b5\u003e] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[\u003cffffffff856f65b5\u003e] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[\u003cffffffff85618009\u003e] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[\u003cffffffff8561821a\u003e] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[\u003cffffffff838bd5a3\u003e] ip6_route_output include/net/ip6_route.h:100 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff838c2909\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84d03900\u003e] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[\u003cffffffff84d03900\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84d03900\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff84d080e2\u003e] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[\u003cffffffff855ce4cd\u003e] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[\u003cffffffff855ce4cd\u003e] neigh_hh_output include/net/neighbour.h:529 [inline]\n[\u003cf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52796",
"url": "https://www.suse.com/security/cve/CVE-2023-52796"
},
{
"category": "external",
"summary": "SUSE Bug 1224930 for CVE-2023-52796",
"url": "https://bugzilla.suse.com/1224930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[ 250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[ 250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[ 250.500549] Workqueue: events rpc_free_client_work\n[ 250.501001] Call Trace:\n[ 250.502880] kasan_report+0xb6/0xf0\n[ 250.503209] ? dget_parent+0x195/0x200\n[ 250.503561] dget_parent+0x195/0x200\n[ 250.503897] ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[ 250.504384] rpc_rmdir_depopulate+0x1b/0x90\n[ 250.504781] rpc_remove_client_dir+0xf5/0x150\n[ 250.505195] rpc_free_client_work+0xe4/0x230\n[ 250.505598] process_one_work+0x8ee/0x13b0\n...\n[ 22.039056] Allocated by task 244:\n[ 22.039390] kasan_save_stack+0x22/0x50\n[ 22.039758] kasan_set_track+0x25/0x30\n[ 22.040109] __kasan_slab_alloc+0x59/0x70\n[ 22.040487] kmem_cache_alloc_lru+0xf0/0x240\n[ 22.040889] __d_alloc+0x31/0x8e0\n[ 22.041207] d_alloc+0x44/0x1f0\n[ 22.041514] __rpc_lookup_create_exclusive+0x11c/0x140\n[ 22.041987] rpc_mkdir_populate.constprop.0+0x5f/0x110\n[ 22.042459] rpc_create_client_dir+0x34/0x150\n[ 22.042874] rpc_setup_pipedir_sb+0x102/0x1c0\n[ 22.043284] rpc_client_register+0x136/0x4e0\n[ 22.043689] rpc_new_client+0x911/0x1020\n[ 22.044057] rpc_create_xprt+0xcb/0x370\n[ 22.044417] rpc_create+0x36b/0x6c0\n...\n[ 22.049524] Freed by task 0:\n[ 22.049803] kasan_save_stack+0x22/0x50\n[ 22.050165] kasan_set_track+0x25/0x30\n[ 22.050520] kasan_save_free_info+0x2b/0x50\n[ 22.050921] __kasan_slab_free+0x10e/0x1a0\n[ 22.051306] kmem_cache_free+0xa5/0x390\n[ 22.051667] rcu_core+0x62c/0x1930\n[ 22.051995] __do_softirq+0x165/0x52a\n[ 22.052347]\n[ 22.052503] Last potentially related work creation:\n[ 22.052952] kasan_save_stack+0x22/0x50\n[ 22.053313] __kasan_record_aux_stack+0x8e/0xa0\n[ 22.053739] __call_rcu_common.constprop.0+0x6b/0x8b0\n[ 22.054209] dentry_free+0xb2/0x140\n[ 22.054540] __dentry_kill+0x3be/0x540\n[ 22.054900] shrink_dentry_list+0x199/0x510\n[ 22.055293] shrink_dcache_parent+0x190/0x240\n[ 22.055703] do_one_tree+0x11/0x40\n[ 22.056028] shrink_dcache_for_umount+0x61/0x140\n[ 22.056461] generic_shutdown_super+0x70/0x590\n[ 22.056879] kill_anon_super+0x3a/0x60\n[ 22.057234] rpc_kill_sb+0x121/0x200",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52803",
"url": "https://www.suse.com/security/cve/CVE-2023-52803"
},
{
"category": "external",
"summary": "SUSE Bug 1225008 for CVE-2023-52803",
"url": "https://bugzilla.suse.com/1225008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52821",
"url": "https://www.suse.com/security/cve/CVE-2023-52821"
},
{
"category": "external",
"summary": "SUSE Bug 1225022 for CVE-2023-52821",
"url": "https://bugzilla.suse.com/1225022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52864",
"url": "https://www.suse.com/security/cve/CVE-2023-52864"
},
{
"category": "external",
"summary": "SUSE Bug 1225132 for CVE-2023-52864",
"url": "https://bugzilla.suse.com/1225132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52865",
"url": "https://www.suse.com/security/cve/CVE-2023-52865"
},
{
"category": "external",
"summary": "SUSE Bug 1225086 for CVE-2023-52865",
"url": "https://bugzilla.suse.com/1225086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52867"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52867",
"url": "https://www.suse.com/security/cve/CVE-2023-52867"
},
{
"category": "external",
"summary": "SUSE Bug 1225009 for CVE-2023-52867",
"url": "https://bugzilla.suse.com/1225009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52875"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52875",
"url": "https://www.suse.com/security/cve/CVE-2023-52875"
},
{
"category": "external",
"summary": "SUSE Bug 1225096 for CVE-2023-52875",
"url": "https://bugzilla.suse.com/1225096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52880",
"url": "https://www.suse.com/security/cve/CVE-2023-52880"
},
{
"category": "external",
"summary": "SUSE Bug 1222619 for CVE-2023-52880",
"url": "https://bugzilla.suse.com/1222619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2024-0639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0639"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0639",
"url": "https://www.suse.com/security/cve/CVE-2024-0639"
},
{
"category": "external",
"summary": "SUSE Bug 1218917 for CVE-2024-0639",
"url": "https://bugzilla.suse.com/1218917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-26625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26625"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk-\u003esk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock-\u003esk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock-\u003esk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n list_empty include/linux/list.h:373 [inline]\n waitqueue_active include/linux/wait.h:127 [inline]\n sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n skb_release_all net/core/skbuff.c:1092 [inline]\n napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n napi_poll net/core/dev.c:6645 [inline]\n net_rx_action+0x956/0xe90 net/core/dev.c:6778\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e\n\nAllocated by task 5167:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3019 [inline]\n sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n alloc_inode+0x5d/0x220 fs/inode.c:260\n new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n sock_alloc+0x40/0x270 net/socket.c:634\n __sock_create+0xbc/0x800 net/socket.c:1535\n sock_create net/socket.c:1622 [inline]\n __sys_socket_create net/socket.c:1659 [inline]\n __sys_socket+0x14c/0x260 net/socket.c:1706\n __do_sys_socket net/socket.c:1720 [inline]\n __se_sys_socket net/socket.c:1718 [inline]\n __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n poison_slab_object mm/kasan/common.c:241 [inline]\n __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26625",
"url": "https://www.suse.com/security/cve/CVE-2024-26625"
},
{
"category": "external",
"summary": "SUSE Bug 1221086 for CVE-2024-26625",
"url": "https://bugzilla.suse.com/1221086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26739"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26739",
"url": "https://www.suse.com/security/cve/CVE-2024-26739"
},
{
"category": "external",
"summary": "SUSE Bug 1222559 for CVE-2024-26739",
"url": "https://bugzilla.suse.com/1222559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n ulen = len + skb_queue_empty(\u0026sk-\u003esk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26752",
"url": "https://www.suse.com/security/cve/CVE-2024-26752"
},
{
"category": "external",
"summary": "SUSE Bug 1222667 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "external",
"summary": "SUSE Bug 1223292 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1223292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (\u0026d-\u003elock).\nTo avoid possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n[1] lock(\u0026bdev-\u003ebd_size_lock);\n local_irq_disable();\n [2] lock(\u0026d-\u003elock);\n [3] lock(\u0026bdev-\u003ebd_size_lock);\n \u003cInterrupt\u003e\n[4] lock(\u0026d-\u003elock);\n\n *** DEADLOCK ***\n\nWhere [1](\u0026bdev-\u003ebd_size_lock) hold by zram_add()-\u003eset_capacity().\n[2]lock(\u0026d-\u003elock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](\u0026bdev-\u003ebd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(\u0026d-\u003elock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](\u0026d-\u003elock) -\u003e [3](\u0026bdev-\u003ebd_size_lock) by moving set_capacity()\noutside.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26775",
"url": "https://www.suse.com/security/cve/CVE-2024-26775"
},
{
"category": "external",
"summary": "SUSE Bug 1222627 for CVE-2024-26775",
"url": "https://bugzilla.suse.com/1222627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere\u0027s a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26791",
"url": "https://www.suse.com/security/cve/CVE-2024-26791"
},
{
"category": "external",
"summary": "SUSE Bug 1222793 for CVE-2024-26791",
"url": "https://bugzilla.suse.com/1222793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need. However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t. That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26828",
"url": "https://www.suse.com/security/cve/CVE-2024-26828"
},
{
"category": "external",
"summary": "SUSE Bug 1223084 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "external",
"summary": "SUSE Bug 1223363 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26846"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26846",
"url": "https://www.suse.com/security/cve/CVE-2024-26846"
},
{
"category": "external",
"summary": "SUSE Bug 1223023 for CVE-2024-26846",
"url": "https://bugzilla.suse.com/1223023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26874"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt\u0027s possible that mtk_crtc-\u003eevent is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc-\u003eevent, but in\nmtk_drm_crtc_atomic_flush(), it\u0027s is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1 CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc-\u003eevent is not null,\n step 1:\n mtk_drm_crtc_atomic_flush:\n mtk_drm_crtc_update_config(\n !!mtk_crtc-\u003eevent)\nstep 2:\nmtk_crtc_ddp_irq -\u003e\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc-\u003eevent set to null,\npending_needs_vblank set to false\nunlock\n pending_needs_vblank set to true,\n\n step 2:\n mtk_crtc_ddp_irq -\u003e\n mtk_drm_finish_page_flip called again,\n pending_needs_vblank is still true\n //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it\u0027s more\nefficient to just check if mtk_crtc-\u003eevent is null before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26874",
"url": "https://www.suse.com/security/cve/CVE-2024-26874"
},
{
"category": "external",
"summary": "SUSE Bug 1223048 for CVE-2024-26874",
"url": "https://bugzilla.suse.com/1223048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26876"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: adv7511: fix crash on irq during probe\n\nMoved IRQ registration down to end of adv7511_probe().\n\nIf an IRQ already is pending during adv7511_probe\n(before adv7511_cec_init) then cec_received_msg_ts\ncould crash using uninitialized data:\n\n Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5\n Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP\n Call trace:\n cec_received_msg_ts+0x48/0x990 [cec]\n adv7511_cec_irq_process+0x1cc/0x308 [adv7511]\n adv7511_irq_process+0xd8/0x120 [adv7511]\n adv7511_irq_handler+0x1c/0x30 [adv7511]\n irq_thread_fn+0x30/0xa0\n irq_thread+0x14c/0x238\n kthread+0x190/0x1a8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26876",
"url": "https://www.suse.com/security/cve/CVE-2024-26876"
},
{
"category": "external",
"summary": "SUSE Bug 1223119 for CVE-2024-26876",
"url": "https://bugzilla.suse.com/1223119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26900"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26900",
"url": "https://www.suse.com/security/cve/CVE-2024-26900"
},
{
"category": "external",
"summary": "SUSE Bug 1223046 for CVE-2024-26900",
"url": "https://bugzilla.suse.com/1223046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26915"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26915",
"url": "https://www.suse.com/security/cve/CVE-2024-26915"
},
{
"category": "external",
"summary": "SUSE Bug 1223207 for CVE-2024-26915",
"url": "https://bugzilla.suse.com/1223207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26920"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26920",
"url": "https://www.suse.com/security/cve/CVE-2024-26920"
},
{
"category": "external",
"summary": "SUSE Bug 1228237 for CVE-2024-26920",
"url": "https://bugzilla.suse.com/1228237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26921"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug. Quoting Eric:\n Calling ip_defrag() in output path is also implying skb_orphan(),\n which is buggy because output path relies on sk not disappearing.\n\n A relevant old patch about the issue was :\n 8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n [..]\n\n net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n inet socket, not an arbitrary one.\n\n If we orphan the packet in ipvlan, then downstream things like FQ\n packet scheduler will not work properly.\n\n We need to change ip_defrag() to only use skb_orphan() when really\n needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned. This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26921",
"url": "https://www.suse.com/security/cve/CVE-2024-26921"
},
{
"category": "external",
"summary": "SUSE Bug 1223138 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "external",
"summary": "SUSE Bug 1223139 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26929"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26929",
"url": "https://www.suse.com/security/cve/CVE-2024-26929"
},
{
"category": "external",
"summary": "SUSE Bug 1223715 for CVE-2024-26929",
"url": "https://bugzilla.suse.com/1223715"
},
{
"category": "external",
"summary": "SUSE Bug 1223716 for CVE-2024-26929",
"url": "https://bugzilla.suse.com/1223716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26930"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha-\u003evp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha-\u003evp_map. ha-\u003evp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26930",
"url": "https://www.suse.com/security/cve/CVE-2024-26930"
},
{
"category": "external",
"summary": "SUSE Bug 1223626 for CVE-2024-26930",
"url": "https://bugzilla.suse.com/1223626"
},
{
"category": "external",
"summary": "SUSE Bug 1223681 for CVE-2024-26930",
"url": "https://bugzilla.suse.com/1223681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26931"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix command flush on cable pull\n\nSystem crash due to command failed to flush back to SCSI layer.\n\n BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP NOPTI\n CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- - - 4.18.0-372.9.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]\n RIP: 0010:__wake_up_common+0x4c/0x190\n Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 \u003c49\u003e 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75\n RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086\n RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320\n RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8\n R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20\n R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n __wake_up_common_lock+0x7c/0xc0\n qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0\n ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.\n ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1\n ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0\n ? __switch_to+0x10c/0x450\n ? process_one_work+0x1a7/0x360\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.\n ? worker_thread+0x1ce/0x390\n ? create_worker+0x1a0/0x1a0\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70\n ? kthread+0x10a/0x120\n qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8\n ? set_kthread_struct+0x40/0x40\n qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.\n ? ret_from_fork+0x1f/0x40\n qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout\n\nThe system was under memory stress where driver was not able to allocate an\nSRB to carry out error recovery of cable pull. The failure to flush causes\nupper layer to start modifying scsi_cmnd. When the system frees up some\nmemory, the subsequent cable pull trigger another command flush. At this\npoint the driver access a null pointer when attempting to DMA unmap the\nSGL.\n\nAdd a check to make sure commands are flush back on session tear down to\nprevent the null pointer access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26931",
"url": "https://www.suse.com/security/cve/CVE-2024-26931"
},
{
"category": "external",
"summary": "SUSE Bug 1223627 for CVE-2024-26931",
"url": "https://bugzilla.suse.com/1223627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface\u0027s parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected. As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete. But usb_deauthorize_interface() can\u0027t complete\nuntil the device lock has been released, and the lock won\u0027t be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun \u003csamsun1006219@gmail.com\u003e\nReported by: xingwei lee \u003cxrivendell7@gmail.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26934",
"url": "https://www.suse.com/security/cve/CVE-2024-26934"
},
{
"category": "external",
"summary": "SUSE Bug 1223671 for CVE-2024-26934",
"url": "https://bugzilla.suse.com/1223671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26957"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n kernel: kmalloc_trace+0x3f2/0x470\n kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt]\n kernel: zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n kernel: ap_device_probe+0x15c/0x290\n kernel: really_probe+0xd2/0x468\n kernel: driver_probe_device+0x40/0xf0\n kernel: __device_attach_driver+0xc0/0x140\n kernel: bus_for_each_drv+0x8c/0xd0\n kernel: __device_attach+0x114/0x198\n kernel: bus_probe_device+0xb4/0xc8\n kernel: device_add+0x4d2/0x6e0\n kernel: ap_scan_adapter+0x3d0/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n kernel: kfree+0x37e/0x418\n kernel: zcrypt_card_put+0x54/0x80 [zcrypt]\n kernel: ap_device_remove+0x4c/0xe0\n kernel: device_release_driver_internal+0x1c4/0x270\n kernel: bus_remove_device+0x100/0x188\n kernel: device_del+0x164/0x3c0\n kernel: device_unregister+0x30/0x90\n kernel: ap_scan_adapter+0xc8/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: kthread+0x150/0x168\n kernel: __ret_from_fork+0x3c/0x58\n kernel: ret_from_fork+0xa/0x30\n kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........\n kernel: Object 00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkkhKkkk.\n kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb ........\n kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ\n kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n kernel: Call Trace:\n kernel: [\u003c00000000ca5ab5b8\u003e] dump_stack_lvl+0x90/0x120\n kernel: [\u003c00000000c99d78bc\u003e] check_bytes_and_report+0x114/0x140\n kernel: [\u003c00000000c99d53cc\u003e] check_object+0x334/0x3f8\n kernel: [\u003c00000000c99d820c\u003e] alloc_debug_processing+0xc4/0x1f8\n kernel: [\u003c00000000c99d852e\u003e] get_partial_node.part.0+0x1ee/0x3e0\n kernel: [\u003c00000000c99d94ec\u003e] ___slab_alloc+0xaf4/0x13c8\n kernel: [\u003c00000000c99d9e38\u003e] __slab_alloc.constprop.0+0x78/0xb8\n kernel: [\u003c00000000c99dc8dc\u003e] __kmalloc+0x434/0x590\n kernel: [\u003c00000000c9b4c0ce\u003e] ext4_htree_store_dirent+0x4e/0x1c0\n kernel: [\u003c00000000c9b908a2\u003e] htree_dirblock_to_tree+0x17a/0x3f0\n kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26957",
"url": "https://www.suse.com/security/cve/CVE-2024-26957"
},
{
"category": "external",
"summary": "SUSE Bug 1223666 for CVE-2024-26957",
"url": "https://bugzilla.suse.com/1223666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26958"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we\u0027re completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we\u0027re submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes. With my patch the stress test has been running for\nseveral hours without popping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26958",
"url": "https://www.suse.com/security/cve/CVE-2024-26958"
},
{
"category": "external",
"summary": "SUSE Bug 1223653 for CVE-2024-26958",
"url": "https://bugzilla.suse.com/1223653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee \u003c48\u003e 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt-\u003ememory-\u003eptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won\u0027t have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it\u0027s write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26984",
"url": "https://www.suse.com/security/cve/CVE-2024-26984"
},
{
"category": "external",
"summary": "SUSE Bug 1223633 for CVE-2024-26984",
"url": "https://bugzilla.suse.com/1223633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), \u0027in_ep\u0027 and/or \u0027out_ep\u0027 may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since \u0027in_ep\u0027 is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut \u0027dev-\u003eport_usb\u0027 associated to \u0027ncm-\u003eport\u0027 is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n usb0: eth_stop dev-\u003eport_usb=ffffff9b179c3200\n --\u003e error happens in usb_ep_enable().\n NCM: ncm_disable: ncm=ffffff9b179c3200\n --\u003e no gether_disconnect() since ncm-\u003eport.in_ep-\u003eenabled is false.\n NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n NCM: ncm_free: ncm free ncm=ffffff9b179c3200 \u003c-- released ncm\n\n[function link via configfs]\n NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n usb0: eth_open dev-\u003eport_usb=ffffff9b179c3200 \u003c-- previous released ncm\n usb0: eth_start dev-\u003eport_usb=ffffff9b179c3200 \u003c--\n eth_start_xmit()\n --\u003e dev-\u003ewrap()\n Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if \u0027ncm-\u003enetdev\u0027 is not NULL at\nncm_disable() to call gether_disconnect() to deassociate \u0027dev-\u003eport_usb\u0027.\nIt\u0027s more reasonable to check \u0027ncm-\u003enetdev\u0027 to call gether_connect/disconnect\nrather than check \u0027ncm-\u003eport.in_ep-\u003eenabled\u0027 since it might not be enabled\nbut the gether connection might be established.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26996",
"url": "https://www.suse.com/security/cve/CVE-2024-26996"
},
{
"category": "external",
"summary": "SUSE Bug 1223752 for CVE-2024-26996",
"url": "https://bugzilla.suse.com/1223752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27008"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: nv04: Fix out of bounds access\n\nWhen Output Resource (dcb-\u003eor) value is assigned in\nfabricate_dcb_output(), there may be out of bounds access to\ndac_users array in case dcb-\u003eor is zero because ffs(dcb-\u003eor) is\nused as index there.\nThe \u0027or\u0027 argument of fabricate_dcb_output() must be interpreted as a\nnumber of bit to set, not value.\n\nUtilize macros from \u0027enum nouveau_or\u0027 in calls instead of hardcoding.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27008",
"url": "https://www.suse.com/security/cve/CVE-2024-27008"
},
{
"category": "external",
"summary": "SUSE Bug 1223802 for CVE-2024-27008",
"url": "https://bugzilla.suse.com/1223802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module\u0027s refcount. Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27054",
"url": "https://www.suse.com/security/cve/CVE-2024-27054"
},
{
"category": "external",
"summary": "SUSE Bug 1223819 for CVE-2024-27054",
"url": "https://bugzilla.suse.com/1223819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27059",
"url": "https://www.suse.com/security/cve/CVE-2024-27059"
},
{
"category": "external",
"summary": "SUSE Bug 1223738 for CVE-2024-27059",
"url": "https://bugzilla.suse.com/1223738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS: 00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555] \u003cTASK\u003e\n[ 4562.099573] ? die_addr+0x36/0x90\n[ 4562.099583] ? exc_general_protection+0x246/0x4a0\n[ 4562.099593] ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600] ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730] nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861] nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986] nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156] ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163] ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182] ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189] nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356] __do_fault+0x32/0x150\n[ 4562.100362] do_fault+0x7c/0x560\n[ 4562.100369] __handle_mm_fault+0x800/0xc10\n[ 4562.100382] handle_mm_fault+0x17c/0x3e0\n[ 4562.100388] do_user_addr_fault+0x208/0x860\n[ 4562.100395] exc_page_fault+0x7f/0x200\n[ 4562.100402] asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446] \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27062",
"url": "https://www.suse.com/security/cve/CVE-2024-27062"
},
{
"category": "external",
"summary": "SUSE Bug 1223834 for CVE-2024-27062",
"url": "https://bugzilla.suse.com/1223834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27388"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa-\u003edata need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27388",
"url": "https://www.suse.com/security/cve/CVE-2024-27388"
},
{
"category": "external",
"summary": "SUSE Bug 1223744 for CVE-2024-27388",
"url": "https://bugzilla.suse.com/1223744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27396"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27396",
"url": "https://www.suse.com/security/cve/CVE-2024-27396"
},
{
"category": "external",
"summary": "SUSE Bug 1224096 for CVE-2024-27396",
"url": "https://bugzilla.suse.com/1224096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n Cleanup Thread | Worker Thread\nsco_sock_release |\n sco_sock_close |\n __sco_sock_close |\n sco_sock_set_timer |\n schedule_delayed_work |\n sco_sock_kill | (wait a time)\n sock_put(sk) //FREE | sco_sock_timeout\n | sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[ 95.890016] ==================================================================\n[ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[ 95.890755] Workqueue: events sco_sock_timeout\n[ 95.890755] Call Trace:\n[ 95.890755] \u003cTASK\u003e\n[ 95.890755] dump_stack_lvl+0x45/0x110\n[ 95.890755] print_address_description+0x78/0x390\n[ 95.890755] print_report+0x11b/0x250\n[ 95.890755] ? __virt_addr_valid+0xbe/0xf0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_report+0x139/0x170\n[ 95.890755] ? update_load_avg+0xe5/0x9f0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_check_range+0x2c3/0x2e0\n[ 95.890755] sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] process_one_work+0x561/0xc50\n[ 95.890755] worker_thread+0xab2/0x13c0\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] kthread+0x279/0x300\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork+0x34/0x60\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork_asm+0x11/0x20\n[ 95.890755] \u003c/TASK\u003e\n[ 95.890755]\n[ 95.890755] Allocated by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] __kasan_kmalloc+0x86/0x90\n[ 95.890755] __kmalloc+0x17f/0x360\n[ 95.890755] sk_prot_alloc+0xe1/0x1a0\n[ 95.890755] sk_alloc+0x31/0x4e0\n[ 95.890755] bt_sock_alloc+0x2b/0x2a0\n[ 95.890755] sco_sock_create+0xad/0x320\n[ 95.890755] bt_sock_create+0x145/0x320\n[ 95.890755] __sock_create+0x2e1/0x650\n[ 95.890755] __sys_socket+0xd0/0x280\n[ 95.890755] __x64_sys_socket+0x75/0x80\n[ 95.890755] do_syscall_64+0xc4/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] Freed by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] kasan_save_free_info+0x40/0x50\n[ 95.890755] poison_slab_object+0x118/0x180\n[ 95.890755] __kasan_slab_free+0x12/0x30\n[ 95.890755] kfree+0xb2/0x240\n[ 95.890755] __sk_destruct+0x317/0x410\n[ 95.890755] sco_sock_release+0x232/0x280\n[ 95.890755] sock_close+0xb2/0x210\n[ 95.890755] __fput+0x37f/0x770\n[ 95.890755] task_work_run+0x1ae/0x210\n[ 95.890755] get_signal+0xe17/0xf70\n[ 95.890755] arch_do_signal_or_restart+0x3f/0x520\n[ 95.890755] syscall_exit_to_user_mode+0x55/0x120\n[ 95.890755] do_syscall_64+0xd1/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the object at ffff88800c388000\n[ 95.890755] which belongs to the cache kmalloc-1k of size 1024\n[ 95.890755] The buggy address is located 128 bytes inside of\n[ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the physical page:\n[ 95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 95.890755] ano\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27398",
"url": "https://www.suse.com/security/cve/CVE-2024-27398"
},
{
"category": "external",
"summary": "SUSE Bug 1224174 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "external",
"summary": "SUSE Bug 1225013 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1225013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27401",
"url": "https://www.suse.com/security/cve/CVE-2024-27401"
},
{
"category": "external",
"summary": "SUSE Bug 1224181 for CVE-2024-27401",
"url": "https://bugzilla.suse.com/1224181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27419",
"url": "https://www.suse.com/security/cve/CVE-2024-27419"
},
{
"category": "external",
"summary": "SUSE Bug 1224759 for CVE-2024-27419",
"url": "https://bugzilla.suse.com/1224759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "low"
}
],
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27436",
"url": "https://www.suse.com/security/cve/CVE-2024-27436"
},
{
"category": "external",
"summary": "SUSE Bug 1224803 for CVE-2024-27436",
"url": "https://bugzilla.suse.com/1224803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm-\u003elock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn\u0027t fully\nresolve the bug, as region-\u003epages is also dynamically allocated. I.e. the\nregion structure itself would be fine, but region-\u003epages could be freed.\n\nFlushing multiple pages under kvm-\u003elock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35791",
"url": "https://www.suse.com/security/cve/CVE-2024-35791"
},
{
"category": "external",
"summary": "SUSE Bug 1224725 for CVE-2024-35791",
"url": "https://bugzilla.suse.com/1224725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn\u0027t really\nguarantee that. It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete. In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync(). [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point. A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35809",
"url": "https://www.suse.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "SUSE Bug 1224738 for CVE-2024-35809",
"url": "https://bugzilla.suse.com/1224738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n -\u003ebrcmf_usb_probe_cb\n -\u003ebrcmf_attach\n -\u003ebrcmf_bus_started\n -\u003ebrcmf_cfg80211_attach\n -\u003ewl_init_priv\n -\u003ebrcmf_init_escan\n -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n -\u003ebrcmf_usb_disconnect_cb\n -\u003ebrcmf_detach\n -\u003ebrcmf_cfg80211_detach\n -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35811",
"url": "https://www.suse.com/security/cve/CVE-2024-35811"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2024-35811",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35830"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35830",
"url": "https://www.suse.com/security/cve/CVE-2024-35830"
},
{
"category": "external",
"summary": "SUSE Bug 1224680 for CVE-2024-35830",
"url": "https://bugzilla.suse.com/1224680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35849"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Uninit was created at:\n __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n __do_kmalloc_node mm/slub.c:3954 [inline]\n __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n kmalloc_node include/linux/slab.h:648 [inline]\n kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n kvmalloc include/linux/slab.h:766 [inline]\n init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Bytes 40-65535 of 65536 are uninitialized\n Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we\u0027re copying a \u0027struct btrfs_data_container\u0027 back\nto user-space. This btrfs_data_container is allocated in\n\u0027init_data_container()\u0027 via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35849",
"url": "https://www.suse.com/security/cve/CVE-2024-35849"
},
{
"category": "external",
"summary": "SUSE Bug 1224733 for CVE-2024-35849",
"url": "https://bugzilla.suse.com/1224733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35877"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35877",
"url": "https://www.suse.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "SUSE Bug 1224525 for CVE-2024-35877",
"url": "https://bugzilla.suse.com/1224525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35887",
"url": "https://www.suse.com/security/cve/CVE-2024-35887"
},
{
"category": "external",
"summary": "SUSE Bug 1224663 for CVE-2024-35887",
"url": "https://bugzilla.suse.com/1224663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35895"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35895",
"url": "https://www.suse.com/security/cve/CVE-2024-35895"
},
{
"category": "external",
"summary": "SUSE Bug 1224511 for CVE-2024-35895",
"url": "https://bugzilla.suse.com/1224511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35914"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35914",
"url": "https://www.suse.com/security/cve/CVE-2024-35914"
},
{
"category": "external",
"summary": "SUSE Bug 1224482 for CVE-2024-35914",
"url": "https://bugzilla.suse.com/1224482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don\u0027t check if plane-\u003estate-\u003efb == state-\u003efb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[ 110.908514] ------------[ cut here ]------------\n[ 110.908529] refcount_t: underflow; use-after-free.\n[ 110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[ 110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[ 110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G C 6.1.66-v8+ #32\n[ 110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[ 110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[ 110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[ 110.909170] sp : ffffffc00913b9c0\n[ 110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[ 110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[ 110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[ 110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[ 110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[ 110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[ 110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[ 110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[ 110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[ 110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[ 110.909434] Call trace:\n[ 110.909441] refcount_dec_not_one+0xb8/0xc0\n[ 110.909461] vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[ 110.909903] vc4_cleanup_fb+0x44/0x50 [vc4]\n[ 110.910315] drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[ 110.910669] vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[ 110.911079] commit_tail+0xb0/0x164 [drm_kms_helper]\n[ 110.911397] drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[ 110.911716] drm_atomic_commit+0xb0/0xdc [drm]\n[ 110.912569] drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[ 110.913330] drm_ioctl_kernel+0xec/0x15c [drm]\n[ 110.914091] drm_ioctl+0x24c/0x3b0 [drm]\n[ 110.914850] __arm64_sys_ioctl+0x9c/0xd4\n[ 110.914873] invoke_syscall+0x4c/0x114\n[ 110.914897] el0_svc_common+0xd0/0x118\n[ 110.914917] do_el0_svc+0x38/0xd0\n[ 110.914936] el0_svc+0x30/0x8c\n[ 110.914958] el0t_64_sync_handler+0x84/0xf0\n[ 110.914979] el0t_64_sync+0x18c/0x190\n[ 110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane-\u003estate-\u003efb == state-\u003efb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don\u0027t decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn\u0027t be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35932",
"url": "https://www.suse.com/security/cve/CVE-2024-35932"
},
{
"category": "external",
"summary": "SUSE Bug 1224650 for CVE-2024-35932",
"url": "https://bugzilla.suse.com/1224650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35935"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don\u0027t accidentally leak kernel\naddresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35935",
"url": "https://www.suse.com/security/cve/CVE-2024-35935"
},
{
"category": "external",
"summary": "SUSE Bug 1224645 for CVE-2024-35935",
"url": "https://bugzilla.suse.com/1224645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35936"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n offset -1, this is an inexact search and the key-\u003eoffset will contain\n the correct offset upon a successful search, a valid chunk tree item\n cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n item, the offset is decremented by 1 before the next loop, it\u0027s\n impossible to find a chunk item there due to alignment and size\n constraints",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35936",
"url": "https://www.suse.com/security/cve/CVE-2024-35936"
},
{
"category": "external",
"summary": "SUSE Bug 1224644 for CVE-2024-35936",
"url": "https://bugzilla.suse.com/1224644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35944",
"url": "https://www.suse.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "SUSE Bug 1224648 for CVE-2024-35944",
"url": "https://bugzilla.suse.com/1224648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35955"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE -\u003e\n MODULE_STATE_GOING -\u003e MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module-\u003estate becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module-\u003estate has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35955",
"url": "https://www.suse.com/security/cve/CVE-2024-35955"
},
{
"category": "external",
"summary": "SUSE Bug 1224676 for CVE-2024-35955",
"url": "https://bugzilla.suse.com/1224676"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35969"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(\u0026ifp-\u003eaddr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[ 41.506330] refcount_t: addition on 0; use-after-free.\n[ 41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[ 41.507413] Modules linked in: veth bridge stp llc\n[ 41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[ 41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[ 41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[ 41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 \u003c0f\u003e 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[ 41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[ 41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[ 41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[ 41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[ 41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[ 41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[ 41.514086] FS: 00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[ 41.514726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[ 41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 41.516799] Call Trace:\n[ 41.517037] \u003cTASK\u003e\n[ 41.517249] ? __warn+0x7b/0x120\n[ 41.517535] ? refcount_warn_saturate+0xa5/0x130\n[ 41.517923] ? report_bug+0x164/0x190\n[ 41.518240] ? handle_bug+0x3d/0x70\n[ 41.518541] ? exc_invalid_op+0x17/0x70\n[ 41.520972] ? asm_exc_invalid_op+0x1a/0x20\n[ 41.521325] ? refcount_warn_saturate+0xa5/0x130\n[ 41.521708] ipv6_get_ifaddr+0xda/0xe0\n[ 41.522035] inet6_rtm_getaddr+0x342/0x3f0\n[ 41.522376] ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[ 41.522758] rtnetlink_rcv_msg+0x334/0x3d0\n[ 41.523102] ? netlink_unicast+0x30f/0x390\n[ 41.523445] ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[ 41.523832] netlink_rcv_skb+0x53/0x100\n[ 41.524157] netlink_unicast+0x23b/0x390\n[ 41.524484] netlink_sendmsg+0x1f2/0x440\n[ 41.524826] __sys_sendto+0x1d8/0x1f0\n[ 41.525145] __x64_sys_sendto+0x1f/0x30\n[ 41.525467] do_syscall_64+0xa5/0x1b0\n[ 41.525794] entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[ 41.526213] RIP: 0033:0x7fbc4cfcea9a\n[ 41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[ 41.527942] RSP: 002b:00007f\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35969",
"url": "https://www.suse.com/security/cve/CVE-2024-35969"
},
{
"category": "external",
"summary": "SUSE Bug 1224580 for CVE-2024-35969",
"url": "https://bugzilla.suse.com/1224580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35982",
"url": "https://www.suse.com/security/cve/CVE-2024-35982"
},
{
"category": "external",
"summary": "SUSE Bug 1224566 for CVE-2024-35982",
"url": "https://bugzilla.suse.com/1224566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-35984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35984",
"url": "https://www.suse.com/security/cve/CVE-2024-35984"
},
{
"category": "external",
"summary": "SUSE Bug 1224567 for CVE-2024-35984",
"url": "https://bugzilla.suse.com/1224567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-36015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36015",
"url": "https://www.suse.com/security/cve/CVE-2024-36015"
},
{
"category": "external",
"summary": "SUSE Bug 1225640 for CVE-2024-36015",
"url": "https://bugzilla.suse.com/1225640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36029"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn\u0027t set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36029",
"url": "https://www.suse.com/security/cve/CVE-2024-36029"
},
{
"category": "external",
"summary": "SUSE Bug 1225708 for CVE-2024-36029",
"url": "https://bugzilla.suse.com/1225708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-36954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36954"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36954",
"url": "https://www.suse.com/security/cve/CVE-2024-36954"
},
{
"category": "external",
"summary": "SUSE Bug 1225764 for CVE-2024-36954",
"url": "https://bugzilla.suse.com/1225764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.188.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.188.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T10:56:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-36954"
}
]
}
SUSE-SU-2024:1979-1
Vulnerability from csaf_suse - Published: 2024-06-11 07:41 - Updated: 2024-06-11 07:41Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47423: Fix file release memory leak (bsc#1225366).
- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2021-47401: Fix stack information leak (bsc#1225242).
- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2023-52864: Fix opening of char device (bsc#1225132).
- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).
- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
- CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error (bsc#1223752).
- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
Patchnames
SUSE-2024-1979,SUSE-SLE-SERVER-12-SP5-2024-1979
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update blacklist.conf: remove entry\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf: drop entry from it\n- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222 CVE-2023-52732).\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)\n- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708 CVE-2024-36029)\n- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)\n- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2021-47423: Fix file release memory leak (bsc#1225366).\n- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2024-35932: Do not check if plane-\u003estate-\u003efb == state-\u003efb (bsc#1224650).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960, CVE-2021-47277).\n- CVE-2024-35791: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2021-47401: Fix stack information leak (bsc#1225242).\n- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).\n- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2023-52864: Fix opening of char device (bsc#1225132).\n- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)\n- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).\n- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).\n- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)\n- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)\n- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).\n- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).\n- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749).\n- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).\n- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).\n- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).\n- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).\n- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).\n- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2024-26900: Fixed kmemleak of rdev-\u003eserial (bsc#1223046).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error (bsc#1223752).\n- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: sr9700: stop lying about skb-\u003etruesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call-\u003euser_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- usb: aqc111: stop lying about skb-\u003etruesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-1979,SUSE-SLE-SERVER-12-SP5-2024-1979",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1979-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:1979-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241979-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:1979-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1185902",
"url": "https://bugzilla.suse.com/1185902"
},
{
"category": "self",
"summary": "SUSE Bug 1187716",
"url": "https://bugzilla.suse.com/1187716"
},
{
"category": "self",
"summary": "SUSE Bug 1188616",
"url": "https://bugzilla.suse.com/1188616"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191452",
"url": "https://bugzilla.suse.com/1191452"
},
{
"category": "self",
"summary": "SUSE Bug 1194591",
"url": "https://bugzilla.suse.com/1194591"
},
{
"category": "self",
"summary": "SUSE Bug 1197760",
"url": "https://bugzilla.suse.com/1197760"
},
{
"category": "self",
"summary": "SUSE Bug 1206213",
"url": "https://bugzilla.suse.com/1206213"
},
{
"category": "self",
"summary": "SUSE Bug 1206646",
"url": "https://bugzilla.suse.com/1206646"
},
{
"category": "self",
"summary": "SUSE Bug 1207186",
"url": "https://bugzilla.suse.com/1207186"
},
{
"category": "self",
"summary": "SUSE Bug 1209657",
"url": "https://bugzilla.suse.com/1209657"
},
{
"category": "self",
"summary": "SUSE Bug 1210335",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "self",
"summary": "SUSE Bug 1215702",
"url": "https://bugzilla.suse.com/1215702"
},
{
"category": "self",
"summary": "SUSE Bug 1216702",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "self",
"summary": "SUSE Bug 1217169",
"url": "https://bugzilla.suse.com/1217169"
},
{
"category": "self",
"summary": "SUSE Bug 1217519",
"url": "https://bugzilla.suse.com/1217519"
},
{
"category": "self",
"summary": "SUSE Bug 1220487",
"url": "https://bugzilla.suse.com/1220487"
},
{
"category": "self",
"summary": "SUSE Bug 1220854",
"url": "https://bugzilla.suse.com/1220854"
},
{
"category": "self",
"summary": "SUSE Bug 1220928",
"url": "https://bugzilla.suse.com/1220928"
},
{
"category": "self",
"summary": "SUSE Bug 1221044",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "self",
"summary": "SUSE Bug 1221081",
"url": "https://bugzilla.suse.com/1221081"
},
{
"category": "self",
"summary": "SUSE Bug 1221086",
"url": "https://bugzilla.suse.com/1221086"
},
{
"category": "self",
"summary": "SUSE Bug 1221977",
"url": "https://bugzilla.suse.com/1221977"
},
{
"category": "self",
"summary": "SUSE Bug 1221994",
"url": "https://bugzilla.suse.com/1221994"
},
{
"category": "self",
"summary": "SUSE Bug 1222619",
"url": "https://bugzilla.suse.com/1222619"
},
{
"category": "self",
"summary": "SUSE Bug 1222627",
"url": "https://bugzilla.suse.com/1222627"
},
{
"category": "self",
"summary": "SUSE Bug 1222667",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "self",
"summary": "SUSE Bug 1222671",
"url": "https://bugzilla.suse.com/1222671"
},
{
"category": "self",
"summary": "SUSE Bug 1222893",
"url": "https://bugzilla.suse.com/1222893"
},
{
"category": "self",
"summary": "SUSE Bug 1222894",
"url": "https://bugzilla.suse.com/1222894"
},
{
"category": "self",
"summary": "SUSE Bug 1223023",
"url": "https://bugzilla.suse.com/1223023"
},
{
"category": "self",
"summary": "SUSE Bug 1223046",
"url": "https://bugzilla.suse.com/1223046"
},
{
"category": "self",
"summary": "SUSE Bug 1223048",
"url": "https://bugzilla.suse.com/1223048"
},
{
"category": "self",
"summary": "SUSE Bug 1223084",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "self",
"summary": "SUSE Bug 1223138",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "self",
"summary": "SUSE Bug 1223207",
"url": "https://bugzilla.suse.com/1223207"
},
{
"category": "self",
"summary": "SUSE Bug 1223360",
"url": "https://bugzilla.suse.com/1223360"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1223633",
"url": "https://bugzilla.suse.com/1223633"
},
{
"category": "self",
"summary": "SUSE Bug 1223653",
"url": "https://bugzilla.suse.com/1223653"
},
{
"category": "self",
"summary": "SUSE Bug 1223666",
"url": "https://bugzilla.suse.com/1223666"
},
{
"category": "self",
"summary": "SUSE Bug 1223671",
"url": "https://bugzilla.suse.com/1223671"
},
{
"category": "self",
"summary": "SUSE Bug 1223738",
"url": "https://bugzilla.suse.com/1223738"
},
{
"category": "self",
"summary": "SUSE Bug 1223752",
"url": "https://bugzilla.suse.com/1223752"
},
{
"category": "self",
"summary": "SUSE Bug 1223834",
"url": "https://bugzilla.suse.com/1223834"
},
{
"category": "self",
"summary": "SUSE Bug 1223922",
"url": "https://bugzilla.suse.com/1223922"
},
{
"category": "self",
"summary": "SUSE Bug 1223932",
"url": "https://bugzilla.suse.com/1223932"
},
{
"category": "self",
"summary": "SUSE Bug 1223948",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "self",
"summary": "SUSE Bug 1224096",
"url": "https://bugzilla.suse.com/1224096"
},
{
"category": "self",
"summary": "SUSE Bug 1224174",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "self",
"summary": "SUSE Bug 1224181",
"url": "https://bugzilla.suse.com/1224181"
},
{
"category": "self",
"summary": "SUSE Bug 1224347",
"url": "https://bugzilla.suse.com/1224347"
},
{
"category": "self",
"summary": "SUSE Bug 1224482",
"url": "https://bugzilla.suse.com/1224482"
},
{
"category": "self",
"summary": "SUSE Bug 1224511",
"url": "https://bugzilla.suse.com/1224511"
},
{
"category": "self",
"summary": "SUSE Bug 1224525",
"url": "https://bugzilla.suse.com/1224525"
},
{
"category": "self",
"summary": "SUSE Bug 1224566",
"url": "https://bugzilla.suse.com/1224566"
},
{
"category": "self",
"summary": "SUSE Bug 1224580",
"url": "https://bugzilla.suse.com/1224580"
},
{
"category": "self",
"summary": "SUSE Bug 1224592",
"url": "https://bugzilla.suse.com/1224592"
},
{
"category": "self",
"summary": "SUSE Bug 1224601",
"url": "https://bugzilla.suse.com/1224601"
},
{
"category": "self",
"summary": "SUSE Bug 1224607",
"url": "https://bugzilla.suse.com/1224607"
},
{
"category": "self",
"summary": "SUSE Bug 1224621",
"url": "https://bugzilla.suse.com/1224621"
},
{
"category": "self",
"summary": "SUSE Bug 1224644",
"url": "https://bugzilla.suse.com/1224644"
},
{
"category": "self",
"summary": "SUSE Bug 1224645",
"url": "https://bugzilla.suse.com/1224645"
},
{
"category": "self",
"summary": "SUSE Bug 1224648",
"url": "https://bugzilla.suse.com/1224648"
},
{
"category": "self",
"summary": "SUSE Bug 1224650",
"url": "https://bugzilla.suse.com/1224650"
},
{
"category": "self",
"summary": "SUSE Bug 1224663",
"url": "https://bugzilla.suse.com/1224663"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224676",
"url": "https://bugzilla.suse.com/1224676"
},
{
"category": "self",
"summary": "SUSE Bug 1224680",
"url": "https://bugzilla.suse.com/1224680"
},
{
"category": "self",
"summary": "SUSE Bug 1224682",
"url": "https://bugzilla.suse.com/1224682"
},
{
"category": "self",
"summary": "SUSE Bug 1224725",
"url": "https://bugzilla.suse.com/1224725"
},
{
"category": "self",
"summary": "SUSE Bug 1224728",
"url": "https://bugzilla.suse.com/1224728"
},
{
"category": "self",
"summary": "SUSE Bug 1224733",
"url": "https://bugzilla.suse.com/1224733"
},
{
"category": "self",
"summary": "SUSE Bug 1224738",
"url": "https://bugzilla.suse.com/1224738"
},
{
"category": "self",
"summary": "SUSE Bug 1224747",
"url": "https://bugzilla.suse.com/1224747"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224759",
"url": "https://bugzilla.suse.com/1224759"
},
{
"category": "self",
"summary": "SUSE Bug 1224803",
"url": "https://bugzilla.suse.com/1224803"
},
{
"category": "self",
"summary": "SUSE Bug 1224827",
"url": "https://bugzilla.suse.com/1224827"
},
{
"category": "self",
"summary": "SUSE Bug 1224830",
"url": "https://bugzilla.suse.com/1224830"
},
{
"category": "self",
"summary": "SUSE Bug 1224831",
"url": "https://bugzilla.suse.com/1224831"
},
{
"category": "self",
"summary": "SUSE Bug 1224834",
"url": "https://bugzilla.suse.com/1224834"
},
{
"category": "self",
"summary": "SUSE Bug 1224838",
"url": "https://bugzilla.suse.com/1224838"
},
{
"category": "self",
"summary": "SUSE Bug 1224841",
"url": "https://bugzilla.suse.com/1224841"
},
{
"category": "self",
"summary": "SUSE Bug 1224844",
"url": "https://bugzilla.suse.com/1224844"
},
{
"category": "self",
"summary": "SUSE Bug 1224846",
"url": "https://bugzilla.suse.com/1224846"
},
{
"category": "self",
"summary": "SUSE Bug 1224847",
"url": "https://bugzilla.suse.com/1224847"
},
{
"category": "self",
"summary": "SUSE Bug 1224849",
"url": "https://bugzilla.suse.com/1224849"
},
{
"category": "self",
"summary": "SUSE Bug 1224854",
"url": "https://bugzilla.suse.com/1224854"
},
{
"category": "self",
"summary": "SUSE Bug 1224859",
"url": "https://bugzilla.suse.com/1224859"
},
{
"category": "self",
"summary": "SUSE Bug 1224867",
"url": "https://bugzilla.suse.com/1224867"
},
{
"category": "self",
"summary": "SUSE Bug 1224880",
"url": "https://bugzilla.suse.com/1224880"
},
{
"category": "self",
"summary": "SUSE Bug 1224882",
"url": "https://bugzilla.suse.com/1224882"
},
{
"category": "self",
"summary": "SUSE Bug 1224888",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "self",
"summary": "SUSE Bug 1224889",
"url": "https://bugzilla.suse.com/1224889"
},
{
"category": "self",
"summary": "SUSE Bug 1224892",
"url": "https://bugzilla.suse.com/1224892"
},
{
"category": "self",
"summary": "SUSE Bug 1224893",
"url": "https://bugzilla.suse.com/1224893"
},
{
"category": "self",
"summary": "SUSE Bug 1224899",
"url": "https://bugzilla.suse.com/1224899"
},
{
"category": "self",
"summary": "SUSE Bug 1224904",
"url": "https://bugzilla.suse.com/1224904"
},
{
"category": "self",
"summary": "SUSE Bug 1224907",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "self",
"summary": "SUSE Bug 1224916",
"url": "https://bugzilla.suse.com/1224916"
},
{
"category": "self",
"summary": "SUSE Bug 1224917",
"url": "https://bugzilla.suse.com/1224917"
},
{
"category": "self",
"summary": "SUSE Bug 1224922",
"url": "https://bugzilla.suse.com/1224922"
},
{
"category": "self",
"summary": "SUSE Bug 1224926",
"url": "https://bugzilla.suse.com/1224926"
},
{
"category": "self",
"summary": "SUSE Bug 1224930",
"url": "https://bugzilla.suse.com/1224930"
},
{
"category": "self",
"summary": "SUSE Bug 1224931",
"url": "https://bugzilla.suse.com/1224931"
},
{
"category": "self",
"summary": "SUSE Bug 1224942",
"url": "https://bugzilla.suse.com/1224942"
},
{
"category": "self",
"summary": "SUSE Bug 1224954",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "self",
"summary": "SUSE Bug 1224957",
"url": "https://bugzilla.suse.com/1224957"
},
{
"category": "self",
"summary": "SUSE Bug 1224959",
"url": "https://bugzilla.suse.com/1224959"
},
{
"category": "self",
"summary": "SUSE Bug 1224960",
"url": "https://bugzilla.suse.com/1224960"
},
{
"category": "self",
"summary": "SUSE Bug 1224961",
"url": "https://bugzilla.suse.com/1224961"
},
{
"category": "self",
"summary": "SUSE Bug 1224963",
"url": "https://bugzilla.suse.com/1224963"
},
{
"category": "self",
"summary": "SUSE Bug 1224966",
"url": "https://bugzilla.suse.com/1224966"
},
{
"category": "self",
"summary": "SUSE Bug 1224968",
"url": "https://bugzilla.suse.com/1224968"
},
{
"category": "self",
"summary": "SUSE Bug 1224981",
"url": "https://bugzilla.suse.com/1224981"
},
{
"category": "self",
"summary": "SUSE Bug 1224982",
"url": "https://bugzilla.suse.com/1224982"
},
{
"category": "self",
"summary": "SUSE Bug 1224983",
"url": "https://bugzilla.suse.com/1224983"
},
{
"category": "self",
"summary": "SUSE Bug 1224987",
"url": "https://bugzilla.suse.com/1224987"
},
{
"category": "self",
"summary": "SUSE Bug 1224990",
"url": "https://bugzilla.suse.com/1224990"
},
{
"category": "self",
"summary": "SUSE Bug 1224996",
"url": "https://bugzilla.suse.com/1224996"
},
{
"category": "self",
"summary": "SUSE Bug 1225008",
"url": "https://bugzilla.suse.com/1225008"
},
{
"category": "self",
"summary": "SUSE Bug 1225009",
"url": "https://bugzilla.suse.com/1225009"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225022",
"url": "https://bugzilla.suse.com/1225022"
},
{
"category": "self",
"summary": "SUSE Bug 1225026",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "self",
"summary": "SUSE Bug 1225030",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "self",
"summary": "SUSE Bug 1225054",
"url": "https://bugzilla.suse.com/1225054"
},
{
"category": "self",
"summary": "SUSE Bug 1225058",
"url": "https://bugzilla.suse.com/1225058"
},
{
"category": "self",
"summary": "SUSE Bug 1225059",
"url": "https://bugzilla.suse.com/1225059"
},
{
"category": "self",
"summary": "SUSE Bug 1225060",
"url": "https://bugzilla.suse.com/1225060"
},
{
"category": "self",
"summary": "SUSE Bug 1225062",
"url": "https://bugzilla.suse.com/1225062"
},
{
"category": "self",
"summary": "SUSE Bug 1225082",
"url": "https://bugzilla.suse.com/1225082"
},
{
"category": "self",
"summary": "SUSE Bug 1225084",
"url": "https://bugzilla.suse.com/1225084"
},
{
"category": "self",
"summary": "SUSE Bug 1225086",
"url": "https://bugzilla.suse.com/1225086"
},
{
"category": "self",
"summary": "SUSE Bug 1225092",
"url": "https://bugzilla.suse.com/1225092"
},
{
"category": "self",
"summary": "SUSE Bug 1225096",
"url": "https://bugzilla.suse.com/1225096"
},
{
"category": "self",
"summary": "SUSE Bug 1225112",
"url": "https://bugzilla.suse.com/1225112"
},
{
"category": "self",
"summary": "SUSE Bug 1225124",
"url": "https://bugzilla.suse.com/1225124"
},
{
"category": "self",
"summary": "SUSE Bug 1225128",
"url": "https://bugzilla.suse.com/1225128"
},
{
"category": "self",
"summary": "SUSE Bug 1225132",
"url": "https://bugzilla.suse.com/1225132"
},
{
"category": "self",
"summary": "SUSE Bug 1225141",
"url": "https://bugzilla.suse.com/1225141"
},
{
"category": "self",
"summary": "SUSE Bug 1225143",
"url": "https://bugzilla.suse.com/1225143"
},
{
"category": "self",
"summary": "SUSE Bug 1225144",
"url": "https://bugzilla.suse.com/1225144"
},
{
"category": "self",
"summary": "SUSE Bug 1225151",
"url": "https://bugzilla.suse.com/1225151"
},
{
"category": "self",
"summary": "SUSE Bug 1225153",
"url": "https://bugzilla.suse.com/1225153"
},
{
"category": "self",
"summary": "SUSE Bug 1225155",
"url": "https://bugzilla.suse.com/1225155"
},
{
"category": "self",
"summary": "SUSE Bug 1225157",
"url": "https://bugzilla.suse.com/1225157"
},
{
"category": "self",
"summary": "SUSE Bug 1225164",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "self",
"summary": "SUSE Bug 1225177",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "self",
"summary": "SUSE Bug 1225189",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "self",
"summary": "SUSE Bug 1225192",
"url": "https://bugzilla.suse.com/1225192"
},
{
"category": "self",
"summary": "SUSE Bug 1225193",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "self",
"summary": "SUSE Bug 1225198",
"url": "https://bugzilla.suse.com/1225198"
},
{
"category": "self",
"summary": "SUSE Bug 1225201",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "self",
"summary": "SUSE Bug 1225207",
"url": "https://bugzilla.suse.com/1225207"
},
{
"category": "self",
"summary": "SUSE Bug 1225208",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "self",
"summary": "SUSE Bug 1225222",
"url": "https://bugzilla.suse.com/1225222"
},
{
"category": "self",
"summary": "SUSE Bug 1225230",
"url": "https://bugzilla.suse.com/1225230"
},
{
"category": "self",
"summary": "SUSE Bug 1225242",
"url": "https://bugzilla.suse.com/1225242"
},
{
"category": "self",
"summary": "SUSE Bug 1225244",
"url": "https://bugzilla.suse.com/1225244"
},
{
"category": "self",
"summary": "SUSE Bug 1225247",
"url": "https://bugzilla.suse.com/1225247"
},
{
"category": "self",
"summary": "SUSE Bug 1225251",
"url": "https://bugzilla.suse.com/1225251"
},
{
"category": "self",
"summary": "SUSE Bug 1225252",
"url": "https://bugzilla.suse.com/1225252"
},
{
"category": "self",
"summary": "SUSE Bug 1225256",
"url": "https://bugzilla.suse.com/1225256"
},
{
"category": "self",
"summary": "SUSE Bug 1225303",
"url": "https://bugzilla.suse.com/1225303"
},
{
"category": "self",
"summary": "SUSE Bug 1225318",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "self",
"summary": "SUSE Bug 1225322",
"url": "https://bugzilla.suse.com/1225322"
},
{
"category": "self",
"summary": "SUSE Bug 1225329",
"url": "https://bugzilla.suse.com/1225329"
},
{
"category": "self",
"summary": "SUSE Bug 1225330",
"url": "https://bugzilla.suse.com/1225330"
},
{
"category": "self",
"summary": "SUSE Bug 1225336",
"url": "https://bugzilla.suse.com/1225336"
},
{
"category": "self",
"summary": "SUSE Bug 1225347",
"url": "https://bugzilla.suse.com/1225347"
},
{
"category": "self",
"summary": "SUSE Bug 1225351",
"url": "https://bugzilla.suse.com/1225351"
},
{
"category": "self",
"summary": "SUSE Bug 1225354",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "self",
"summary": "SUSE Bug 1225355",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "self",
"summary": "SUSE Bug 1225360",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "self",
"summary": "SUSE Bug 1225366",
"url": "https://bugzilla.suse.com/1225366"
},
{
"category": "self",
"summary": "SUSE Bug 1225367",
"url": "https://bugzilla.suse.com/1225367"
},
{
"category": "self",
"summary": "SUSE Bug 1225384",
"url": "https://bugzilla.suse.com/1225384"
},
{
"category": "self",
"summary": "SUSE Bug 1225390",
"url": "https://bugzilla.suse.com/1225390"
},
{
"category": "self",
"summary": "SUSE Bug 1225404",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "self",
"summary": "SUSE Bug 1225409",
"url": "https://bugzilla.suse.com/1225409"
},
{
"category": "self",
"summary": "SUSE Bug 1225411",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "self",
"summary": "SUSE Bug 1225438",
"url": "https://bugzilla.suse.com/1225438"
},
{
"category": "self",
"summary": "SUSE Bug 1225453",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "self",
"summary": "SUSE Bug 1225479",
"url": "https://bugzilla.suse.com/1225479"
},
{
"category": "self",
"summary": "SUSE Bug 1225482",
"url": "https://bugzilla.suse.com/1225482"
},
{
"category": "self",
"summary": "SUSE Bug 1225506",
"url": "https://bugzilla.suse.com/1225506"
},
{
"category": "self",
"summary": "SUSE Bug 1225549",
"url": "https://bugzilla.suse.com/1225549"
},
{
"category": "self",
"summary": "SUSE Bug 1225560",
"url": "https://bugzilla.suse.com/1225560"
},
{
"category": "self",
"summary": "SUSE Bug 1225572",
"url": "https://bugzilla.suse.com/1225572"
},
{
"category": "self",
"summary": "SUSE Bug 1225640",
"url": "https://bugzilla.suse.com/1225640"
},
{
"category": "self",
"summary": "SUSE Bug 1225708",
"url": "https://bugzilla.suse.com/1225708"
},
{
"category": "self",
"summary": "SUSE Bug 1225764",
"url": "https://bugzilla.suse.com/1225764"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46933 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47074 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47162 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47171 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47188 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47206 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47220 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47229 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47231 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47235 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47236 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47237 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47238 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47239 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47245 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47246 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47248 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47249 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47250 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47254 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47258 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47260 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47261 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47269 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47274 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47276 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47277 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47280 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47281 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47284 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47285 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47288 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47301 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47302 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47305 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47307 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47308 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47310 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47314 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47315 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47319 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47320 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47323 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47324 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47330 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47334 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47337 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47343 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47344 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47347 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47352 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47353 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47355 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47356 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47357 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47361 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47369 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47391 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47397 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47400 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47401 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47404 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47409 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47423 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47424 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47431 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47435 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47436 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47456 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47458 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47460 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47469 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47472 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47473 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47478 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47480 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47485 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47485/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47495 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47496 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47497 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47497/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47500 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47509 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47511 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47523 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47541 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47548 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47565 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48686 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48697 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48704 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48708 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48710 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0160 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1829 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42755 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-47233 page",
"url": "https://www.suse.com/security/cve/CVE-2023-47233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52527 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52586 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52591 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52655 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52664 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52685 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52686 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52691 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52696 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52698 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52703 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52730 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52741 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52742 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52747 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52759 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52774 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52781 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52796 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52821 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52864 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52865 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52867 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52875 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52880 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26625 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26752 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26828 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26846 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26874 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26900 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26915 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26920 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26921 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26957 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26984 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26996 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27062 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27396 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27398 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27401 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27419 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27436 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35791 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35809 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35811 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35830 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35877 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35895 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35914 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35932 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35935 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35936 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35944 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35955 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35969 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35982 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35984 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36015 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36029 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36954 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36954/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-06-11T07:41:39Z",
"generator": {
"date": "2024-06-11T07:41:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:1979-1",
"initial_release_date": "2024-06-11T07:41:39Z",
"revision_history": [
{
"date": "2024-06-11T07:41:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.188.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.188.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.188.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.188.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.188.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.188.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.188.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.188.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.188.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.188.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.188.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.188.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.188.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.188.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.188.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.188.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46933"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function\u0027s USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear \u003e set_ftrace_filter\n/sys/kernel/debug/tracing# echo function \u003e current_tracer\n/sys/kernel/debug/tracing# echo 1 \u003e tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 \u003e tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436 [000] ..... 1946.208786: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] ..... 1946.279147: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] .n... 1946.905512: ffs_data_clear \u003c-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G C OE 5.15.0-1-rpi #1 Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [\u003cc08d60a0\u003e] (dump_backtrace) from [\u003cc08d62ec\u003e] (show_stack+0x20/0x24)\n[ 1946.448226] r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [\u003cc08d62cc\u003e] (show_stack) from [\u003cc08d9ae0\u003e] (dump_stack+0x28/0x30)\n[ 1946.470380] [\u003cc08d9ab8\u003e] (dump_stack) from [\u003cc0123500\u003e] (__warn+0xe8/0x154)\n[ 1946.482067] r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [\u003cc0123418\u003e] (__warn) from [\u003cc08d6948\u003e] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758] r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [\u003cc08d68ac\u003e] (warn_slowpath_fmt) from [\u003cc04a948c\u003e] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309] r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [\u003cc04a937c\u003e] (refcount_warn_saturate) from [\u003cc0380134\u003e] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [\u003cc03800ec\u003e] (eventfd_ctx_put) from [\u003cbf5464e8\u003e] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664] r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [\u003cbf546418\u003e] (ffs_data_clear [usb_f_fs]) from [\u003cbf547cc0\u003e] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608] r5:bf54d014 r4:c2695b00\n[ 1946.617522] [\u003cbf547c24\u003e] (ffs_data_closed [usb_f_fs]) from [\u003cbf547da0\u003e] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217] r7:c0dfcb\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46933",
"url": "https://www.suse.com/security/cve/CVE-2021-46933"
},
{
"category": "external",
"summary": "SUSE Bug 1220487 for CVE-2021-46933",
"url": "https://bugzilla.suse.com/1220487"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-47074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47074",
"url": "https://www.suse.com/security/cve/CVE-2021-47074"
},
{
"category": "external",
"summary": "SUSE Bug 1220854 for CVE-2021-47074",
"url": "https://bugzilla.suse.com/1220854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n [] kernel BUG at net/core/skbuff.c:1970!\n [] Call Trace:\n [] skb_clone+0x4d/0xb0\n [] macvlan_broadcast+0xd8/0x160 [macvlan]\n [] macvlan_process_broadcast+0x148/0x150 [macvlan]\n [] process_one_work+0x1a7/0x360\n [] worker_thread+0x30/0x390\n\n [] kernel BUG at mm/usercopy.c:102!\n [] Call Trace:\n [] __check_heap_object+0xd3/0x100\n [] __check_object_size+0xff/0x16b\n [] simple_copy_to_iter+0x1c/0x30\n [] __skb_datagram_iter+0x7d/0x310\n [] __skb_datagram_iter+0x2a5/0x310\n [] skb_copy_datagram_iter+0x3b/0x90\n [] tipc_recvmsg+0x14a/0x3a0 [tipc]\n [] ____sys_recvmsg+0x91/0x150\n [] ___sys_recvmsg+0x7b/0xc0\n\n [] kernel BUG at mm/slub.c:305!\n [] Call Trace:\n [] \u003cIRQ\u003e\n [] kmem_cache_free+0x3ff/0x400\n [] __netif_receive_skb_core+0x12c/0xc40\n [] ? kmem_cache_alloc+0x12e/0x270\n [] netif_receive_skb_internal+0x3d/0xb0\n [] ? get_rx_page_info+0x8e/0xa0 [be2net]\n [] be_poll+0x6ef/0xd00 [be2net]\n [] ? irq_exit+0x4f/0x100\n [] net_rx_action+0x149/0x3b0\n\n ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47162",
"url": "https://www.suse.com/security/cve/CVE-2021-47162"
},
{
"category": "external",
"summary": "SUSE Bug 1221977 for CVE-2021-47162",
"url": "https://bugzilla.suse.com/1221977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n [\u003cffffffff84245b62\u003e] kmalloc include/linux/slab.h:556 [inline]\n [\u003cffffffff84245b62\u003e] kzalloc include/linux/slab.h:686 [inline]\n [\u003cffffffff84245b62\u003e] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n [\u003cffffffff82b5b2e6\u003e] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47171",
"url": "https://www.suse.com/security/cve/CVE-2021-47171"
},
{
"category": "external",
"summary": "SUSE Bug 1221994 for CVE-2021-47171",
"url": "https://bugzilla.suse.com/1221994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47188",
"url": "https://www.suse.com/security/cve/CVE-2021-47188"
},
{
"category": "external",
"summary": "SUSE Bug 1222671 for CVE-2021-47188",
"url": "https://bugzilla.suse.com/1222671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47206",
"url": "https://www.suse.com/security/cve/CVE-2021-47206"
},
{
"category": "external",
"summary": "SUSE Bug 1222894 for CVE-2021-47206",
"url": "https://bugzilla.suse.com/1222894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47220"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47220",
"url": "https://www.suse.com/security/cve/CVE-2021-47220"
},
{
"category": "external",
"summary": "SUSE Bug 1224859 for CVE-2021-47220",
"url": "https://bugzilla.suse.com/1224859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: aardvark: Fix kernel panic during PIO transfer\n\nTrying to start a new PIO transfer by writing value 0 in PIO_START register\nwhen previous transfer has not yet completed (which is indicated by value 1\nin PIO_START) causes an External Abort on CPU, which results in kernel\npanic:\n\n SError Interrupt on CPU0, code 0xbf000002 -- SError\n Kernel panic - not syncing: Asynchronous SError Interrupt\n\nTo prevent kernel panic, it is required to reject a new PIO transfer when\nprevious one has not finished yet.\n\nIf previous PIO transfer is not finished yet, the kernel may issue a new\nPIO request only if the previous PIO transfer timed out.\n\nIn the past the root cause of this issue was incorrectly identified (as it\noften happens during link retraining or after link down event) and special\nhack was implemented in Trusted Firmware to catch all SError events in EL3,\nto ignore errors with code 0xbf000002 and not forwarding any other errors\nto kernel and instead throw panic from EL3 Trusted Firmware handler.\n\nLinks to discussion and patches about this issue:\nhttps://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50\nhttps://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/\nhttps://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/\nhttps://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541\n\nBut the real cause was the fact that during link retraining or after link\ndown event the PIO transfer may take longer time, up to the 1.44s until it\ntimes out. This increased probability that a new PIO transfer would be\nissued by kernel while previous one has not finished yet.\n\nAfter applying this change into the kernel, it is possible to revert the\nmentioned TF-A hack and SError events do not have to be caught in TF-A EL3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47229",
"url": "https://www.suse.com/security/cve/CVE-2021-47229"
},
{
"category": "external",
"summary": "SUSE Bug 1224854 for CVE-2021-47229",
"url": "https://bugzilla.suse.com/1224854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: fix memory leak in mcba_usb\n\nSyzbot reported memory leak in SocketCAN driver for Microchip CAN BUS\nAnalyzer Tool. The problem was in unfreed usb_coherent.\n\nIn mcba_usb_start() 20 coherent buffers are allocated and there is\nnothing, that frees them:\n\n1) In callback function the urb is resubmitted and that\u0027s all\n2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER\n is not set (see mcba_usb_start) and this flag cannot be used with\n coherent buffers.\n\nFail log:\n| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected\n| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)\n\nSo, all allocated buffers should be freed with usb_free_coherent()\nexplicitly\n\nNOTE:\nThe same pattern for allocating and freeing coherent buffers\nis used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47231",
"url": "https://www.suse.com/security/cve/CVE-2021-47231"
},
{
"category": "external",
"summary": "SUSE Bug 1224849 for CVE-2021-47231",
"url": "https://bugzilla.suse.com/1224849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: fix potential use-after-free in ec_bhf_remove\n\nstatic void ec_bhf_remove(struct pci_dev *dev)\n{\n...\n\tstruct ec_bhf_priv *priv = netdev_priv(net_dev);\n\n\tunregister_netdev(net_dev);\n\tfree_netdev(net_dev);\n\n\tpci_iounmap(dev, priv-\u003edma_io);\n\tpci_iounmap(dev, priv-\u003eio);\n...\n}\n\npriv is netdev private data, but it is used\nafter free_netdev(). It can cause use-after-free when accessing priv\npointer. So, fix it by moving free_netdev() after pci_iounmap()\ncalls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47235",
"url": "https://www.suse.com/security/cve/CVE-2021-47235"
},
{
"category": "external",
"summary": "SUSE Bug 1224844 for CVE-2021-47235",
"url": "https://bugzilla.suse.com/1224844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2021-47236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47236",
"url": "https://www.suse.com/security/cve/CVE-2021-47236"
},
{
"category": "external",
"summary": "SUSE Bug 1224841 for CVE-2021-47236",
"url": "https://bugzilla.suse.com/1224841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47236"
},
{
"cve": "CVE-2021-47237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47237"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hamradio: fix memory leak in mkiss_close\n\nMy local syzbot instance hit memory leak in\nmkiss_open()[1]. The problem was in missing\nfree_netdev() in mkiss_close().\n\nIn mkiss_open() netdevice is allocated and then\nregistered, but in mkiss_close() netdevice was\nonly unregistered, but not freed.\n\nFail log:\n\nBUG: memory leak\nunreferenced object 0xffff8880281ba000 (size 4096):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00 ax0.............\n 00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00 .\u0027.*............\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706e7e8\u003e] alloc_netdev_mqs+0x98/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880141a9a00 (size 96):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff ...(.......(....\n 98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00 .....@..........\n backtrace:\n [\u003cffffffff8709f68b\u003e] __hw_addr_create_ex+0x5b/0x310\n [\u003cffffffff8709fb38\u003e] __hw_addr_add_ex+0x1f8/0x2b0\n [\u003cffffffff870a0c7b\u003e] dev_addr_init+0x10b/0x1f0\n [\u003cffffffff8706e88b\u003e] alloc_netdev_mqs+0x13b/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880219bfc00 (size 512):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff ...(............\n 80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706eec7\u003e] alloc_netdev_mqs+0x777/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff888029b2b200 (size 256):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706f062\u003e] alloc_netdev_mqs+0x912/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47237",
"url": "https://www.suse.com/security/cve/CVE-2021-47237"
},
{
"category": "external",
"summary": "SUSE Bug 1224830 for CVE-2021-47237",
"url": "https://bugzilla.suse.com/1224830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47237"
},
{
"cve": "CVE-2021-47238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in ip_mc_add1_src\n\nBUG: memory leak\nunreferenced object 0xffff888101bc4c00 (size 32):\n comm \"syz-executor527\", pid 360, jiffies 4294807421 (age 19.329s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................\n backtrace:\n [\u003c00000000f17c5244\u003e] kmalloc include/linux/slab.h:558 [inline]\n [\u003c00000000f17c5244\u003e] kzalloc include/linux/slab.h:688 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095\n [\u003c000000001cb99709\u003e] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416\n [\u003c0000000052cf19ed\u003e] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]\n [\u003c0000000052cf19ed\u003e] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423\n [\u003c00000000477edfbc\u003e] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857\n [\u003c00000000e75ca9bb\u003e] __sys_setsockopt+0x158/0x270 net/socket.c:2117\n [\u003c00000000bdb993a8\u003e] __do_sys_setsockopt net/socket.c:2128 [inline]\n [\u003c00000000bdb993a8\u003e] __se_sys_setsockopt net/socket.c:2125 [inline]\n [\u003c00000000bdb993a8\u003e] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125\n [\u003c000000006a1ffdbd\u003e] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47\n [\u003c00000000b11467c4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn commit 24803f38a5c0 (\"igmp: do not remove igmp souce list info when set\nlink down\"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,\nbecause it was also called in igmpv3_clear_delrec().\n\nRough callgraph:\n\ninetdev_destroy\n-\u003e ip_mc_destroy_dev\n -\u003e igmpv3_clear_delrec\n -\u003e ip_mc_clear_src\n-\u003e RCU_INIT_POINTER(dev-\u003eip_ptr, NULL)\n\nHowever, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn\u0027t\nrelease in_dev-\u003emc_list-\u003esources. And RCU_INIT_POINTER() assigns the\nNULL to dev-\u003eip_ptr. As a result, in_dev cannot be obtained through\ninetdev_by_index() and then in_dev-\u003emc_list-\u003esources cannot be released\nby ip_mc_del1_src() in the sock_close. Rough call sequence goes like:\n\nsock_close\n-\u003e __sock_release\n -\u003e inet_release\n -\u003e ip_mc_drop_socket\n -\u003e inetdev_by_index\n -\u003e ip_mc_leave_src\n -\u003e ip_mc_del_src\n -\u003e ip_mc_del1_src\n\nSo we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free\nin_dev-\u003emc_list-\u003esources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47238",
"url": "https://www.suse.com/security/cve/CVE-2021-47238"
},
{
"category": "external",
"summary": "SUSE Bug 1224847 for CVE-2021-47238",
"url": "https://bugzilla.suse.com/1224847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47238"
},
{
"cve": "CVE-2021-47239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47239",
"url": "https://www.suse.com/security/cve/CVE-2021-47239"
},
{
"category": "external",
"summary": "SUSE Bug 1224846 for CVE-2021-47239",
"url": "https://bugzilla.suse.com/1224846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47239"
},
{
"cve": "CVE-2021-47245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: synproxy: Fix out of bounds when parsing TCP options\n\nThe TCP option parser in synproxy (synproxy_parse_options) could read\none byte out of bounds. When the length is 1, the execution flow gets\ninto the loop, reads one byte of the opcode, and if the opcode is\nneither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds\nthe length of 1.\n\nThis fix is inspired by commit 9609dad263f8 (\"ipv4: tcp_input: fix stack\nout of bounds when parsing TCP options.\").\n\nv2 changes:\n\nAdded an early return when length \u003c 0 to avoid calling\nskb_header_pointer with negative length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47245",
"url": "https://www.suse.com/security/cve/CVE-2021-47245"
},
{
"category": "external",
"summary": "SUSE Bug 1224838 for CVE-2021-47245",
"url": "https://bugzilla.suse.com/1224838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47245"
},
{
"cve": "CVE-2021-47246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47246"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix page reclaim for dead peer hairpin\n\nWhen adding a hairpin flow, a firmware-side send queue is created for\nthe peer net device, which claims some host memory pages for its\ninternal ring buffer. If the peer net device is removed/unbound before\nthe hairpin flow is deleted, then the send queue is not destroyed which\nleads to a stack trace on pci device remove:\n\n[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource\n[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110\n[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0\n[ 748.002171] ------------[ cut here ]------------\n[ 748.001177] FW pages counter is 4 after reclaiming all pages\n[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [ +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]\n[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1\n[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]\n[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 \u003c0f\u003e 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9\n[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286\n[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000\n[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51\n[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8\n[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30\n[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000\n[ 748.001429] FS: 00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000\n[ 748.001695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0\n[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 748.001654] Call Trace:\n[ 748.000576] ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]\n[ 748.001416] ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]\n[ 748.001354] ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]\n[ 748.001203] mlx5_function_teardown+0x30/0x60 [mlx5_core]\n[ 748.001275] mlx5_uninit_one+0xa7/0xc0 [mlx5_core]\n[ 748.001200] remove_one+0x5f/0xc0 [mlx5_core]\n[ 748.001075] pci_device_remove+0x9f/0x1d0\n[ 748.000833] device_release_driver_internal+0x1e0/0x490\n[ 748.001207] unbind_store+0x19f/0x200\n[ 748.000942] ? sysfs_file_ops+0x170/0x170\n[ 748.001000] kernfs_fop_write_iter+0x2bc/0x450\n[ 748.000970] new_sync_write+0x373/0x610\n[ 748.001124] ? new_sync_read+0x600/0x600\n[ 748.001057] ? lock_acquire+0x4d6/0x700\n[ 748.000908] ? lockdep_hardirqs_on_prepare+0x400/0x400\n[ 748.001126] ? fd_install+0x1c9/0x4d0\n[ 748.000951] vfs_write+0x4d0/0x800\n[ 748.000804] ksys_write+0xf9/0x1d0\n[ 748.000868] ? __x64_sys_read+0xb0/0xb0\n[ 748.000811] ? filp_open+0x50/0x50\n[ 748.000919] ? syscall_enter_from_user_mode+0x1d/0x50\n[ 748.001223] do_syscall_64+0x3f/0x80\n[ 748.000892] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 748.00\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47246",
"url": "https://www.suse.com/security/cve/CVE-2021-47246"
},
{
"category": "external",
"summary": "SUSE Bug 1224831 for CVE-2021-47246",
"url": "https://bugzilla.suse.com/1224831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47246"
},
{
"cve": "CVE-2021-47248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: fix race between close() and udp_abort()\n\nKaustubh reported and diagnosed a panic in udp_lib_lookup().\nThe root cause is udp_abort() racing with close(). Both\nracing functions acquire the socket lock, but udp{v6}_destroy_sock()\nrelease it before performing destructive actions.\n\nWe can\u0027t easily extend the socket lock scope to avoid the race,\ninstead use the SOCK_DEAD flag to prevent udp_abort from doing\nany action when the critical race happens.\n\nDiagnosed-and-tested-by: Kaustubh Pandey \u003ckapandey@codeaurora.org\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47248",
"url": "https://www.suse.com/security/cve/CVE-2021-47248"
},
{
"category": "external",
"summary": "SUSE Bug 1224867 for CVE-2021-47248",
"url": "https://bugzilla.suse.com/1224867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47248"
},
{
"cve": "CVE-2021-47249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47249"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: fix memory leak in rds_recvmsg\n\nSyzbot reported memory leak in rds. The problem\nwas in unputted refcount in case of error.\n\nint rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,\n\t\tint msg_flags)\n{\n...\n\n\tif (!rds_next_incoming(rs, \u0026inc)) {\n\t\t...\n\t}\n\nAfter this \"if\" inc refcount incremented and\n\n\tif (rds_cmsg_recv(inc, msg, rs)) {\n\t\tret = -EFAULT;\n\t\tgoto out;\n\t}\n...\nout:\n\treturn ret;\n}\n\nin case of rds_cmsg_recv() fail the refcount won\u0027t be\ndecremented. And it\u0027s easy to see from ftrace log, that\nrds_inc_addref() don\u0027t have rds_inc_put() pair in\nrds_recvmsg() after rds_cmsg_recv()\n\n 1) | rds_recvmsg() {\n 1) 3.721 us | rds_inc_addref();\n 1) 3.853 us | rds_message_inc_copy_to_user();\n 1) + 10.395 us | rds_cmsg_recv();\n 1) + 34.260 us | }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47249",
"url": "https://www.suse.com/security/cve/CVE-2021-47249"
},
{
"category": "external",
"summary": "SUSE Bug 1224880 for CVE-2021-47249",
"url": "https://bugzilla.suse.com/1224880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47249"
},
{
"cve": "CVE-2021-47250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in netlbl_cipsov4_add_std\n\nReported by syzkaller:\nBUG: memory leak\nunreferenced object 0xffff888105df7000 (size 64):\ncomm \"syz-executor842\", pid 360, jiffies 4294824824 (age 22.546s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003c00000000e67ed558\u003e] kmalloc include/linux/slab.h:590 [inline]\n[\u003c00000000e67ed558\u003e] kzalloc include/linux/slab.h:720 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416\n[\u003c0000000006040154\u003e] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739\n[\u003c00000000204d7a1c\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n[\u003c00000000204d7a1c\u003e] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800\n[\u003c00000000c0d6a995\u003e] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504\n[\u003c00000000d78b9d2c\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n[\u003c000000009733081b\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n[\u003c000000009733081b\u003e] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340\n[\u003c00000000d5fd43b8\u003e] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929\n[\u003c000000000a2d1e40\u003e] sock_sendmsg_nosec net/socket.c:654 [inline]\n[\u003c000000000a2d1e40\u003e] sock_sendmsg+0x139/0x170 net/socket.c:674\n[\u003c00000000321d1969\u003e] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350\n[\u003c00000000964e16bc\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404\n[\u003c000000001615e288\u003e] __sys_sendmsg+0xd3/0x190 net/socket.c:2433\n[\u003c000000004ee8b6a5\u003e] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47\n[\u003c00000000171c7cee\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe memory of doi_def-\u003emap.std pointing is allocated in\nnetlbl_cipsov4_add_std, but no place has freed it. It should be\nfreed in cipso_v4_doi_free which frees the cipso DOI resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47250",
"url": "https://www.suse.com/security/cve/CVE-2021-47250"
},
{
"category": "external",
"summary": "SUSE Bug 1224827 for CVE-2021-47250",
"url": "https://bugzilla.suse.com/1224827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47250"
},
{
"cve": "CVE-2021-47252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid WARN_ON timing related checks\n\nThe soft/batadv interface for a queued OGM can be changed during the time\nthe OGM was queued for transmission and when the OGM is actually\ntransmitted by the worker.\n\nBut WARN_ON must be used to denote kernel bugs and not to print simple\nwarnings. A warning can simply be printed using pr_warn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47252",
"url": "https://www.suse.com/security/cve/CVE-2021-47252"
},
{
"category": "external",
"summary": "SUSE Bug 1224882 for CVE-2021-47252",
"url": "https://bugzilla.suse.com/1224882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47252"
},
{
"cve": "CVE-2021-47254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(\u0026lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(\u0026lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47254",
"url": "https://www.suse.com/security/cve/CVE-2021-47254"
},
{
"category": "external",
"summary": "SUSE Bug 1224888 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "external",
"summary": "SUSE Bug 1227559 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1227559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47254"
},
{
"cve": "CVE-2021-47258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47258"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix error handling of scsi_host_alloc()\n\nAfter device is initialized via device_initialize(), or its name is set via\ndev_set_name(), the device has to be freed via put_device(). Otherwise\ndevice name will be leaked because it is allocated dynamically in\ndev_set_name().\n\nFix the leak by replacing kfree() with put_device(). Since\nscsi_host_dev_release() properly handles IDA and kthread removal, remove\nspecial-casing these from the error handling as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47258",
"url": "https://www.suse.com/security/cve/CVE-2021-47258"
},
{
"category": "external",
"summary": "SUSE Bug 1224899 for CVE-2021-47258",
"url": "https://bugzilla.suse.com/1224899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47258"
},
{
"cve": "CVE-2021-47260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a potential NULL dereference in nfs_get_client()\n\nNone of the callers are expecting NULL returns from nfs_get_client() so\nthis code will lead to an Oops. It\u0027s better to return an error\npointer. I expect that this is dead code so hopefully no one is\naffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47260",
"url": "https://www.suse.com/security/cve/CVE-2021-47260"
},
{
"category": "external",
"summary": "SUSE Bug 1224834 for CVE-2021-47260",
"url": "https://bugzilla.suse.com/1224834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47260"
},
{
"cve": "CVE-2021-47261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix initializing CQ fragments buffer\n\nThe function init_cq_frag_buf() can be called to initialize the current CQ\nfragments buffer cq-\u003ebuf, or the temporary cq-\u003eresize_buf that is filled\nduring CQ resize operation.\n\nHowever, the offending commit started to use function get_cqe() for\ngetting the CQEs, the issue with this change is that get_cqe() always\nreturns CQEs from cq-\u003ebuf, which leads us to initialize the wrong buffer,\nand in case of enlarging the CQ we try to access elements beyond the size\nof the current cq-\u003ebuf and eventually hit a kernel panic.\n\n [exception RIP: init_cq_frag_buf+103]\n [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]\n [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]\n [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]\n [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]\n [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]\n [ffff9f799ddcbec8] kthread at ffffffffa66c5da1\n [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd\n\nFix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that\ntakes the correct source buffer as a parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47261",
"url": "https://www.suse.com/security/cve/CVE-2021-47261"
},
{
"category": "external",
"summary": "SUSE Bug 1224954 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "external",
"summary": "SUSE Bug 1227751 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1227751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47261"
},
{
"cve": "CVE-2021-47265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47265"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA: Verify port when creating flow rule\n\nValidate port value provided by the user and with that remove no longer\nneeded validation by the driver. The missing check in the mlx5_ib driver\ncould cause to the below oops.\n\nCall trace:\n _create_flow_rule+0x2d4/0xf28 [mlx5_ib]\n mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]\n ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]\n ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]\n ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]\n ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]\n do_vfs_ioctl+0xd0/0xaf0\n ksys_ioctl+0x84/0xb4\n __arm64_sys_ioctl+0x28/0xc4\n el0_svc_common.constprop.3+0xa4/0x254\n el0_svc_handler+0x84/0xa0\n el0_svc+0x10/0x26c\n Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47265",
"url": "https://www.suse.com/security/cve/CVE-2021-47265"
},
{
"category": "external",
"summary": "SUSE Bug 1224957 for CVE-2021-47265",
"url": "https://bugzilla.suse.com/1224957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47265"
},
{
"cve": "CVE-2021-47269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: ep0: fix NULL pointer exception\n\nThere is no validation of the index from dwc3_wIndex_to_dep() and we might\nbe referring a non-existing ep and trigger a NULL pointer exception. In\ncertain configurations we might use fewer eps and the index might wrongly\nindicate a larger ep index than existing.\n\nBy adding this validation from the patch we can actually report a wrong\nindex back to the caller.\n\nIn our usecase we are using a composite device on an older kernel, but\nupstream might use this fix also. Unfortunately, I cannot describe the\nhardware for others to reproduce the issue as it is a proprietary\nimplementation.\n\n[ 82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4\n[ 82.966891] Mem abort info:\n[ 82.969663] ESR = 0x96000006\n[ 82.972703] Exception class = DABT (current EL), IL = 32 bits\n[ 82.978603] SET = 0, FnV = 0\n[ 82.981642] EA = 0, S1PTW = 0\n[ 82.984765] Data abort info:\n[ 82.987631] ISV = 0, ISS = 0x00000006\n[ 82.991449] CM = 0, WnR = 0\n[ 82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc\n[ 83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000\n[ 83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP\n[ 83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)\n[ 83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1\n[ 83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)\n[ 83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94\n\n...\n\n[ 83.141788] Call trace:\n[ 83.144227] dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.148823] dwc3_ep0_interrupt+0x3b4/0xc94\n[ 83.181546] ---[ end trace aac6b5267d84c32f ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47269",
"url": "https://www.suse.com/security/cve/CVE-2021-47269"
},
{
"category": "external",
"summary": "SUSE Bug 1224996 for CVE-2021-47269",
"url": "https://bugzilla.suse.com/1224996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47269"
},
{
"cve": "CVE-2021-47274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Correct the length check which causes memory corruption\n\nWe\u0027ve suffered from severe kernel crashes due to memory corruption on\nour production environment, like,\n\nCall Trace:\n[1640542.554277] general protection fault: 0000 [#1] SMP PTI\n[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G\n[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190\n[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286\n[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:\n0000000006e931bf\n[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:\nffff9a45ff004300\n[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:\n0000000000000000\n[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:\nffffffff9a20608d\n[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:\n696c662f65636976\n[1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)\nknlGS:0000000000000000\n[1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:\n00000000003606e0\n[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1640542.566742] Call Trace:\n[1640542.567009] anon_vma_clone+0x5d/0x170\n[1640542.567417] __split_vma+0x91/0x1a0\n[1640542.567777] do_munmap+0x2c6/0x320\n[1640542.568128] vm_munmap+0x54/0x70\n[1640542.569990] __x64_sys_munmap+0x22/0x30\n[1640542.572005] do_syscall_64+0x5b/0x1b0\n[1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[1640542.575642] RIP: 0033:0x7f45d6e61e27\n\nJames Wang has reproduced it stably on the latest 4.19 LTS.\nAfter some debugging, we finally proved that it\u0027s due to ftrace\nbuffer out-of-bound access using a debug tool as follows:\n[ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000\n[ 86.780806] no_context+0xdf/0x3c0\n[ 86.784327] __do_page_fault+0x252/0x470\n[ 86.788367] do_page_fault+0x32/0x140\n[ 86.792145] page_fault+0x1e/0x30\n[ 86.795576] strncpy_from_unsafe+0x66/0xb0\n[ 86.799789] fetch_memory_string+0x25/0x40\n[ 86.804002] fetch_deref_string+0x51/0x60\n[ 86.808134] kprobe_trace_func+0x32d/0x3a0\n[ 86.812347] kprobe_dispatcher+0x45/0x50\n[ 86.816385] kprobe_ftrace_handler+0x90/0xf0\n[ 86.820779] ftrace_ops_assist_func+0xa1/0x140\n[ 86.825340] 0xffffffffc00750bf\n[ 86.828603] do_sys_open+0x5/0x1f0\n[ 86.832124] do_syscall_64+0x5b/0x1b0\n[ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\ncommit b220c049d519 (\"tracing: Check length before giving out\nthe filter buffer\") adds length check to protect trace data\noverflow introduced in 0fc1b09ff1ff, seems that this fix can\u0027t prevent\noverflow entirely, the length check should also take the sizeof\nentry-\u003earray[0] into account, since this array[0] is filled the\nlength of trace data and occupy addtional space and risk overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47274",
"url": "https://www.suse.com/security/cve/CVE-2021-47274"
},
{
"category": "external",
"summary": "SUSE Bug 1224990 for CVE-2021-47274",
"url": "https://bugzilla.suse.com/1224990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47274"
},
{
"cve": "CVE-2021-47276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47276"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Do not blindly read the ip address in ftrace_bug()\n\nIt was reported that a bug on arm64 caused a bad ip address to be used for\nupdating into a nop in ftrace_init(), but the error path (rightfully)\nreturned -EINVAL and not -EFAULT, as the bug caused more than one error to\noccur. But because -EINVAL was returned, the ftrace_bug() tried to report\nwhat was at the location of the ip address, and read it directly. This\ncaused the machine to panic, as the ip was not pointing to a valid memory\naddress.\n\nInstead, read the ip address with copy_from_kernel_nofault() to safely\naccess the memory, and if it faults, report that the address faulted,\notherwise report what was in that location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47276",
"url": "https://www.suse.com/security/cve/CVE-2021-47276"
},
{
"category": "external",
"summary": "SUSE Bug 1224966 for CVE-2021-47276",
"url": "https://bugzilla.suse.com/1224966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47276"
},
{
"cve": "CVE-2021-47277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: avoid speculation-based attacks from out-of-range memslot accesses\n\nKVM\u0027s mechanism for accessing guest memory translates a guest physical\naddress (gpa) to a host virtual address using the right-shifted gpa\n(also known as gfn) and a struct kvm_memory_slot. The translation is\nperformed in __gfn_to_hva_memslot using the following formula:\n\n hva = slot-\u003euserspace_addr + (gfn - slot-\u003ebase_gfn) * PAGE_SIZE\n\nIt is expected that gfn falls within the boundaries of the guest\u0027s\nphysical memory. However, a guest can access invalid physical addresses\nin such a way that the gfn is invalid.\n\n__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first\nretrieves a memslot through __gfn_to_memslot. While __gfn_to_memslot\ndoes check that the gfn falls within the boundaries of the guest\u0027s\nphysical memory or not, a CPU can speculate the result of the check and\ncontinue execution speculatively using an illegal gfn. The speculation\ncan result in calculating an out-of-bounds hva. If the resulting host\nvirtual address is used to load another guest physical address, this\nis effectively a Spectre gadget consisting of two consecutive reads,\nthe second of which is data dependent on the first.\n\nRight now it\u0027s not clear if there are any cases in which this is\nexploitable. One interesting case was reported by the original author\nof this patch, and involves visiting guest page tables on x86. Right\nnow these are not vulnerable because the hva read goes through get_user(),\nwhich contains an LFENCE speculation barrier. However, there are\npatches in progress for x86 uaccess.h to mask kernel addresses instead of\nusing LFENCE; once these land, a guest could use speculation to read\nfrom the VMM\u0027s ring 3 address space. Other architectures such as ARM\nalready use the address masking method, and would be susceptible to\nthis same kind of data-dependent access gadgets. Therefore, this patch\nproactively protects from these attacks by masking out-of-bounds gfns\nin __gfn_to_hva_memslot, which blocks speculation of invalid hvas.\n\nSean Christopherson noted that this patch does not cover\nkvm_read_guest_offset_cached. This however is limited to a few bytes\npast the end of the cache, and therefore it is unlikely to be useful in\nthe context of building a chain of data dependent accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47277",
"url": "https://www.suse.com/security/cve/CVE-2021-47277"
},
{
"category": "external",
"summary": "SUSE Bug 1224960 for CVE-2021-47277",
"url": "https://bugzilla.suse.com/1224960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47277"
},
{
"cve": "CVE-2021-47280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47280"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free read in drm_getunique()\n\nThere is a time-of-check-to-time-of-use error in drm_getunique() due\nto retrieving file_priv-\u003emaster prior to locking the device\u0027s master\nmutex.\n\nAn example can be seen in the crash report of the use-after-free error\nfound by Syzbot:\nhttps://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803\n\nIn the report, the master pointer was used after being freed. This is\nbecause another process had acquired the device\u0027s master mutex in\ndrm_setmaster_ioctl(), then overwrote fpriv-\u003emaster in\ndrm_new_set_master(). The old value of fpriv-\u003emaster was subsequently\nfreed before the mutex was unlocked.\n\nTo fix this, we lock the device\u0027s master mutex before retrieving the\npointer from from fpriv-\u003emaster. This patch passes the Syzbot\nreproducer test.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47280",
"url": "https://www.suse.com/security/cve/CVE-2021-47280"
},
{
"category": "external",
"summary": "SUSE Bug 1224982 for CVE-2021-47280",
"url": "https://bugzilla.suse.com/1224982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47280"
},
{
"cve": "CVE-2021-47281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: Fix race of snd_seq_timer_open()\n\nThe timer instance per queue is exclusive, and snd_seq_timer_open()\nshould have managed the concurrent accesses. It looks as if it\u0027s\nchecking the already existing timer instance at the beginning, but\nit\u0027s not right, because there is no protection, hence any later\nconcurrent call of snd_seq_timer_open() may override the timer\ninstance easily. This may result in UAF, as the leftover timer\ninstance can keep running while the queue itself gets closed, as\nspotted by syzkaller recently.\n\nFor avoiding the race, add a proper check at the assignment of\ntmr-\u003etimeri again, and return -EBUSY if it\u0027s been already registered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47281",
"url": "https://www.suse.com/security/cve/CVE-2021-47281"
},
{
"category": "external",
"summary": "SUSE Bug 1224983 for CVE-2021-47281",
"url": "https://bugzilla.suse.com/1224983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47281"
},
{
"cve": "CVE-2021-47284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n\u0027nj_setup\u0027 in netjet.c might fail with -EIO and in this case\n\u0027card-\u003eirq\u0027 is initialized and is bigger than zero. A subsequent call to\n\u0027nj_release\u0027 will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to \u0027card-\u003eirq\u0027 and just\nkeep the assignment before \u0027request_irq\u0027.\n\nThe KASAN\u0027s log reveals it:\n\n[ 3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[ 3.355112 ] Modules linked in:\n[ 3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[ 3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff \u003c0f\u003e 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[ 3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[ 3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[ 3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[ 3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[ 3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[ 3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[ 3.360652 ] FS: 0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[ 3.361170 ] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[ 3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[ 3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] nj_release+0x51/0x1e0\n[ 3.362175 ] nj_probe+0x450/0x950\n[ 3.362175 ] ? pci_device_remove+0x110/0x110\n[ 3.362175 ] local_pci_probe+0x45/0xa0\n[ 3.362175 ] pci_device_probe+0x12b/0x1d0\n[ 3.362175 ] really_probe+0x2a9/0x610\n[ 3.362175 ] driver_probe_device+0x90/0x1d0\n[ 3.362175 ] ? mutex_lock_nested+0x1b/0x20\n[ 3.362175 ] device_driver_attach+0x68/0x70\n[ 3.362175 ] __driver_attach+0x124/0x1b0\n[ 3.362175 ] ? device_driver_attach+0x70/0x70\n[ 3.362175 ] bus_for_each_dev+0xbb/0x110\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] driver_attach+0x27/0x30\n[ 3.362175 ] bus_add_driver+0x1eb/0x2a0\n[ 3.362175 ] driver_register+0xa9/0x180\n[ 3.362175 ] __pci_register_driver+0x82/0x90\n[ 3.362175 ] ? w6692_init+0x38/0x38\n[ 3.362175 ] nj_init+0x36/0x38\n[ 3.362175 ] do_one_initcall+0x7f/0x3d0\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] ? rcu_read_lock_sched_held+0x4f/0x80\n[ 3.362175 ] kernel_init_freeable+0x2aa/0x301\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] kernel_init+0x18/0x190\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ret_from_fork+0x1f/0x30\n[ 3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[ 3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] dump_stack+0xba/0xf5\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] panic+0x15a/0x3f2\n[ 3.362175 ] ? __warn+0xf2/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] __warn+0x108/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] report_bug+0x119/0x1c0\n[ 3.362175 ] handle_bug+0x3b/0x80\n[ 3.362175 ] exc_invalid_op+0x18/0x70\n[ 3.362175 ] asm_exc_invalid_op+0x12/0x20\n[ 3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47284",
"url": "https://www.suse.com/security/cve/CVE-2021-47284"
},
{
"category": "external",
"summary": "SUSE Bug 1224987 for CVE-2021-47284",
"url": "https://bugzilla.suse.com/1224987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47285"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47285",
"url": "https://www.suse.com/security/cve/CVE-2021-47285"
},
{
"category": "external",
"summary": "SUSE Bug 1224981 for CVE-2021-47285",
"url": "https://bugzilla.suse.com/1224981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47285"
},
{
"cve": "CVE-2021-47288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47288"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()\n\nFix an 11-year old bug in ngene_command_config_free_buf() while\naddressing the following warnings caught with -Warray-bounds:\n\narch/alpha/include/asm/string.h:22:16: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\narch/x86/include/asm/string_32.h:182:25: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\n\nThe problem is that the original code is trying to copy 6 bytes of\ndata into a one-byte size member _config_ of the wrong structue\nFW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a\nlegitimate compiler warning because memcpy() overruns the length\nof \u0026com.cmd.ConfigureBuffers.config. It seems that the right\nstructure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains\n6 more members apart from the header _hdr_. Also, the name of\nthe function ngene_command_config_free_buf() suggests that the actual\nintention is to ConfigureFreeBuffers, instead of ConfigureBuffers\n(which takes place in the function ngene_command_config_buf(), above).\n\nFix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS\ninto new struct config, and use \u0026com.cmd.ConfigureFreeBuffers.config as\nthe destination address, instead of \u0026com.cmd.ConfigureBuffers.config,\nwhen calling memcpy().\n\nThis also helps with the ongoing efforts to globally enable\n-Warray-bounds and get us closer to being able to tighten the\nFORTIFY_SOURCE routines on memcpy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47288",
"url": "https://www.suse.com/security/cve/CVE-2021-47288"
},
{
"category": "external",
"summary": "SUSE Bug 1224889 for CVE-2021-47288",
"url": "https://bugzilla.suse.com/1224889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47288"
},
{
"cve": "CVE-2021-47301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igb_poll() runs\nwhile the controller is reset this can lead to the driver try to free\na skb that was already freed.\n\n(The crash is harder to reproduce with the igb driver, but the same\npotential problem exists as the code is identical to igc)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47301",
"url": "https://www.suse.com/security/cve/CVE-2021-47301"
},
{
"category": "external",
"summary": "SUSE Bug 1224916 for CVE-2021-47301",
"url": "https://bugzilla.suse.com/1224916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47301"
},
{
"cve": "CVE-2021-47302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47302"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igc_poll() runs\nwhile the controller is being reset this can lead to the driver try to\nfree a skb that was already freed.\n\nLog message:\n\n [ 101.525242] refcount_t: underflow; use-after-free.\n [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0\n [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)\n x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)\n ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)\n rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)\n soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)\n iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)\n soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)\n autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)\n i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)\n [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)\n e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)\n usbcore(E) drm(E) button(E) video(E)\n [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe\n [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017\n [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0\n [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48\n 44 01 01 e8 d1 c6 42 00 \u003c0f\u003e 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3\n [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286\n [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001\n [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff\n [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50\n [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00\n [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40\n [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000\n [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0\n [ 101.525343] Call Trace:\n [ 101.525346] sock_wfree+0x9c/0xa0\n [ 101.525353] unix_destruct_scm+0x7b/0xa0\n [ 101.525358] skb_release_head_state+0x40/0x90\n [ 101.525362] skb_release_all+0xe/0x30\n [ 101.525364] napi_consume_skb+0x57/0x160\n [ 101.525367] igc_poll+0xb7/0xc80 [igc]\n [ 101.525376] ? sched_clock+0x5/0x10\n [ 101.525381] ? sched_clock_cpu+0xe/0x100\n [ 101.525385] net_rx_action+0x14c/0x410\n [ 101.525388] __do_softirq+0xe9/0x2f4\n [ 101.525391] __local_bh_enable_ip+0xe3/0x110\n [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0\n [ 101.525398] irq_forced_thread_fn+0x6a/0x80\n [ 101.525401] irq_thread+0xe8/0x180\n [ 101.525403] ? wake_threads_waitq+0x30/0x30\n [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0\n [ 101.525408] kthread+0x183/0x1a0\n [ 101.525412] ? kthread_park+0x80/0x80\n [ 101.525415] ret_from_fork+0x22/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47302",
"url": "https://www.suse.com/security/cve/CVE-2021-47302"
},
{
"category": "external",
"summary": "SUSE Bug 1224917 for CVE-2021-47302",
"url": "https://bugzilla.suse.com/1224917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47302"
},
{
"cve": "CVE-2021-47305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47305"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sync_file: Don\u0027t leak fences on merge failure\n\nEach add_fence() call does a dma_fence_get() on the relevant fence. In\nthe error path, we weren\u0027t calling dma_fence_put() so all those fences\ngot leaked. Also, in the krealloc_array failure case, we weren\u0027t\nfreeing the fences array. Instead, ensure that i and fences are always\nzero-initialized and dma_fence_put() all the fences and kfree(fences) on\nevery error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47305",
"url": "https://www.suse.com/security/cve/CVE-2021-47305"
},
{
"category": "external",
"summary": "SUSE Bug 1224968 for CVE-2021-47305",
"url": "https://bugzilla.suse.com/1224968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47305"
},
{
"cve": "CVE-2021-47307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47307"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent NULL deref in cifs_compose_mount_options()\n\nThe optional @ref parameter might contain an NULL node_name, so\nprevent dereferencing it in cifs_compose_mount_options().\n\nAddresses-Coverity: 1476408 (\"Explicit null dereferenced\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47307",
"url": "https://www.suse.com/security/cve/CVE-2021-47307"
},
{
"category": "external",
"summary": "SUSE Bug 1224961 for CVE-2021-47307",
"url": "https://bugzilla.suse.com/1224961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47307"
},
{
"cve": "CVE-2021-47308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47308"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix array index out of bound exception\n\nFix array index out of bound exception in fc_rport_prli_resp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47308",
"url": "https://www.suse.com/security/cve/CVE-2021-47308"
},
{
"category": "external",
"summary": "SUSE Bug 1224963 for CVE-2021-47308",
"url": "https://bugzilla.suse.com/1224963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47308"
},
{
"cve": "CVE-2021-47310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47310"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47310",
"url": "https://www.suse.com/security/cve/CVE-2021-47310"
},
{
"category": "external",
"summary": "SUSE Bug 1224959 for CVE-2021-47310",
"url": "https://bugzilla.suse.com/1224959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47310"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47314"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure. Fix this by using resource-managed allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47314",
"url": "https://www.suse.com/security/cve/CVE-2021-47314"
},
{
"category": "external",
"summary": "SUSE Bug 1224893 for CVE-2021-47314",
"url": "https://bugzilla.suse.com/1224893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47314"
},
{
"cve": "CVE-2021-47315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47315"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory. Smatch reports:\n\n drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: \u0027fsl_ifc_ctrl_dev-\u003egregs\u0027 not released on lines: 298.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47315",
"url": "https://www.suse.com/security/cve/CVE-2021-47315"
},
{
"category": "external",
"summary": "SUSE Bug 1224892 for CVE-2021-47315",
"url": "https://bugzilla.suse.com/1224892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47315"
},
{
"cve": "CVE-2021-47319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk-\u003evqs should be freed before we call init_vqs()\nin virtblk_restore().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47319",
"url": "https://www.suse.com/security/cve/CVE-2021-47319"
},
{
"category": "external",
"summary": "SUSE Bug 1225054 for CVE-2021-47319",
"url": "https://bugzilla.suse.com/1225054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47319"
},
{
"cve": "CVE-2021-47320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47320"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47320",
"url": "https://www.suse.com/security/cve/CVE-2021-47320"
},
{
"category": "external",
"summary": "SUSE Bug 1225058 for CVE-2021-47320",
"url": "https://bugzilla.suse.com/1225058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47320"
},
{
"cve": "CVE-2021-47321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47321",
"url": "https://www.suse.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "SUSE Bug 1225060 for CVE-2021-47321",
"url": "https://bugzilla.suse.com/1225060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47321"
},
{
"cve": "CVE-2021-47323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47323"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47323",
"url": "https://www.suse.com/security/cve/CVE-2021-47323"
},
{
"category": "external",
"summary": "SUSE Bug 1225026 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "external",
"summary": "SUSE Bug 1227557 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1227557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47323"
},
{
"cve": "CVE-2021-47324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47324"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47324",
"url": "https://www.suse.com/security/cve/CVE-2021-47324"
},
{
"category": "external",
"summary": "SUSE Bug 1225030 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "external",
"summary": "SUSE Bug 1225038 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225038"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47324"
},
{
"cve": "CVE-2021-47330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47330"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final \u0027serial_config()\u0027 fails, \u0027info\u0027 is\nleaking.\n\nAdd a resource handling path to free this memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47330",
"url": "https://www.suse.com/security/cve/CVE-2021-47330"
},
{
"category": "external",
"summary": "SUSE Bug 1225084 for CVE-2021-47330",
"url": "https://bugzilla.suse.com/1225084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47330"
},
{
"cve": "CVE-2021-47334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47334"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47334",
"url": "https://www.suse.com/security/cve/CVE-2021-47334"
},
{
"category": "external",
"summary": "SUSE Bug 1225112 for CVE-2021-47334",
"url": "https://bugzilla.suse.com/1225112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47334"
},
{
"cve": "CVE-2021-47337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix bad pointer dereference when ehandler kthread is invalid\n\nCommit 66a834d09293 (\"scsi: core: Fix error handling of scsi_host_alloc()\")\nchanged the allocation logic to call put_device() to perform host cleanup\nwith the assumption that IDA removal and stopping the kthread would\nproperly be performed in scsi_host_dev_release(). However, in the unlikely\ncase that the error handler thread fails to spawn, shost-\u003eehandler is set\nto ERR_PTR(-ENOMEM).\n\nThe error handler cleanup code in scsi_host_dev_release() will call\nkthread_stop() if shost-\u003eehandler != NULL which will always be the case\nwhether the kthread was successfully spawned or not. In the case that it\nfailed to spawn this has the nasty side effect of trying to dereference an\ninvalid pointer when kthread_stop() is called. The following splat provides\nan example of this behavior in the wild:\n\nscsi host11: error handler thread failed to spawn, error = -4\nKernel attempted to read user page (10c) - exploit attempt? (uid: 0)\nBUG: Kernel NULL pointer dereference on read at 0x0000010c\nFaulting instruction address: 0xc00000000818e9a8\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region\n hash dm_log dm_mod fuse overlay squashfs loop\nCPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1\nNIP: c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8\nREGS: c000000037d12ea0 TRAP: 0300 Not tainted (5.13.0-rc7)\nMSR: 800000000280b033 \u0026lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u0026gt; CR: 28228228\nXER: 20040001\nCFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0\nGPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc\nGPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000\nGPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff\nGPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0\nGPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288\nGPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898\nGPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000\nGPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc\nNIP [c00000000818e9a8] kthread_stop+0x38/0x230\nLR [c0000000089846e8] scsi_host_dev_release+0x98/0x160\nCall Trace:\n[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)\n[c0000000089846e8] scsi_host_dev_release+0x98/0x160\n[c00000000891e960] device_release+0x60/0x100\n[c0000000087e55c4] kobject_release+0x84/0x210\n[c00000000891ec78] put_device+0x28/0x40\n[c000000008984ea4] scsi_host_alloc+0x314/0x430\n[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]\n[c000000008110104] vio_bus_probe+0xa4/0x4b0\n[c00000000892a860] really_probe+0x140/0x680\n[c00000000892aefc] driver_probe_device+0x15c/0x200\n[c00000000892b63c] device_driver_attach+0xcc/0xe0\n[c00000000892b740] __driver_attach+0xf0/0x200\n[c000000008926f28] bus_for_each_dev+0xa8/0x130\n[c000000008929ce4] driver_attach+0x34/0x50\n[c000000008928fc0] bus_add_driver+0x1b0/0x300\n[c00000000892c798] driver_register+0x98/0x1a0\n[c00000000810eb60] __vio_register_driver+0x80/0xe0\n[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]\n[c0000000080121d0] do_one_initcall+0x60/0x2d0\n[c000000008261abc] do_init_module+0x7c/0x320\n[c000000008265700] load_module+0x2350/0x25b0\n[c000000008265cb4] __do_sys_finit_module+0xd4/0x160\n[c000000008031110] system_call_exception+0x150/0x2d0\n[c00000000800d35c] system_call_common+0xec/0x278\n\nFix this be nulling shost-\u003eehandler when the kthread fails to spawn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47337",
"url": "https://www.suse.com/security/cve/CVE-2021-47337"
},
{
"category": "external",
"summary": "SUSE Bug 1224926 for CVE-2021-47337",
"url": "https://bugzilla.suse.com/1224926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47337"
},
{
"cve": "CVE-2021-47343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: assign new_root only when removal succeeds\n\nremove_raw() in dm_btree_remove() may fail due to IO read error\n(e.g. read the content of origin block fails during shadowing),\nand the value of shadow_spine::root is uninitialized, but\nthe uninitialized value is still assign to new_root in the\nend of dm_btree_remove().\n\nFor dm-thin, the value of pmd-\u003edetails_root or pmd-\u003eroot will become\nan uninitialized value, so if trying to read details_info tree again\nout-of-bound memory may occur as showed below:\n\n general protection fault, probably for non-canonical address 0x3fdcb14c8d7520\n CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6\n Hardware name: QEMU Standard PC\n RIP: 0010:metadata_ll_load_ie+0x14/0x30\n Call Trace:\n sm_metadata_count_is_more_than_one+0xb9/0xe0\n dm_tm_shadow_block+0x52/0x1c0\n shadow_step+0x59/0xf0\n remove_raw+0xb2/0x170\n dm_btree_remove+0xf4/0x1c0\n dm_pool_delete_thin_device+0xc3/0x140\n pool_message+0x218/0x2b0\n target_message+0x251/0x290\n ctl_ioctl+0x1c4/0x4d0\n dm_ctl_ioctl+0xe/0x20\n __x64_sys_ioctl+0x7b/0xb0\n do_syscall_64+0x40/0xb0\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFixing it by only assign new_root when removal succeeds",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47343",
"url": "https://www.suse.com/security/cve/CVE-2021-47343"
},
{
"category": "external",
"summary": "SUSE Bug 1225155 for CVE-2021-47343",
"url": "https://bugzilla.suse.com/1225155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47343"
},
{
"cve": "CVE-2021-47344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47344"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: zr364xx: fix memory leak in zr364xx_start_readpipe\n\nsyzbot reported memory leak in zr364xx driver.\nThe problem was in non-freed urb in case of\nusb_submit_urb() fail.\n\nbacktrace:\n [\u003cffffffff82baedf6\u003e] kmalloc include/linux/slab.h:561 [inline]\n [\u003cffffffff82baedf6\u003e] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74\n [\u003cffffffff82f7cce8\u003e] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022\n [\u003cffffffff84251dfc\u003e] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]\n [\u003cffffffff84251dfc\u003e] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516\n [\u003cffffffff82bb6507\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [\u003cffffffff826018a9\u003e] really_probe+0x159/0x500 drivers/base/dd.c:576",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47344",
"url": "https://www.suse.com/security/cve/CVE-2021-47344"
},
{
"category": "external",
"summary": "SUSE Bug 1224922 for CVE-2021-47344",
"url": "https://bugzilla.suse.com/1224922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47344"
},
{
"cve": "CVE-2021-47345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47345"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix rdma_resolve_route() memory leak\n\nFix a memory leak when \"mda_resolve_route() is called more than once on\nthe same \"rdma_cm_id\".\n\nThis is possible if cma_query_handler() triggers the\nRDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and\nallows rdma_resolve_route() to be called again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47345",
"url": "https://www.suse.com/security/cve/CVE-2021-47345"
},
{
"category": "external",
"summary": "SUSE Bug 1225157 for CVE-2021-47345",
"url": "https://bugzilla.suse.com/1225157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47345"
},
{
"cve": "CVE-2021-47347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47347"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47347",
"url": "https://www.suse.com/security/cve/CVE-2021-47347"
},
{
"category": "external",
"summary": "SUSE Bug 1225177 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "external",
"summary": "SUSE Bug 1225305 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47347"
},
{
"cve": "CVE-2021-47352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47352"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47352",
"url": "https://www.suse.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "SUSE Bug 1225124 for CVE-2021-47352",
"url": "https://bugzilla.suse.com/1225124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47352"
},
{
"cve": "CVE-2021-47353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47353"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47353",
"url": "https://www.suse.com/security/cve/CVE-2021-47353"
},
{
"category": "external",
"summary": "SUSE Bug 1225128 for CVE-2021-47353",
"url": "https://bugzilla.suse.com/1225128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47353"
},
{
"cve": "CVE-2021-47355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: nicstar: Fix possible use-after-free in nicstar_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47355",
"url": "https://www.suse.com/security/cve/CVE-2021-47355"
},
{
"category": "external",
"summary": "SUSE Bug 1225141 for CVE-2021-47355",
"url": "https://bugzilla.suse.com/1225141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47355"
},
{
"cve": "CVE-2021-47356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47356",
"url": "https://www.suse.com/security/cve/CVE-2021-47356"
},
{
"category": "external",
"summary": "SUSE Bug 1225143 for CVE-2021-47356",
"url": "https://bugzilla.suse.com/1225143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47356"
},
{
"cve": "CVE-2021-47357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47357"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47357",
"url": "https://www.suse.com/security/cve/CVE-2021-47357"
},
{
"category": "external",
"summary": "SUSE Bug 1225144 for CVE-2021-47357",
"url": "https://bugzilla.suse.com/1225144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47357"
},
{
"cve": "CVE-2021-47361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n but we haven\u0027t yet called get_device(carrier) and probably that\n leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n release the bus. This will free the internal resources tied to the\n device and call mcb_free_bus() which will free the rest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47361",
"url": "https://www.suse.com/security/cve/CVE-2021-47361"
},
{
"category": "external",
"summary": "SUSE Bug 1225151 for CVE-2021-47361",
"url": "https://bugzilla.suse.com/1225151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2021-47362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47362"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state\u0027s link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47362",
"url": "https://www.suse.com/security/cve/CVE-2021-47362"
},
{
"category": "external",
"summary": "SUSE Bug 1225153 for CVE-2021-47362",
"url": "https://bugzilla.suse.com/1225153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47362"
},
{
"cve": "CVE-2021-47369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47369"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card-\u003eqdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue-\u003ebufs[i].pool_entry scribbles all over the CPU\u0027s lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren\u0027t allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card-\u003eqdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens \u003chca@linux.ibm.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47369",
"url": "https://www.suse.com/security/cve/CVE-2021-47369"
},
{
"category": "external",
"summary": "SUSE Bug 1225164 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "external",
"summary": "SUSE Bug 1227324 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1227324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47369"
},
{
"cve": "CVE-2021-47375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47375"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 \u003e /sys/block/sdb/trace/enable\n\t\t\t blk_trace_remove_queue\n\t\t\t synchronize_rcu\n\t\t\t blk_trace_free\n\t\t\t relay_close\nrcu_read_lock\n__blk_add_trace\n trace_note_tsk\n (Iterate running_trace_list)\n\t\t\t relay_close_buf\n\t\t\t\t relay_destroy_buf\n\t\t\t\t kfree(buf)\n trace_note(sdb\u0027s bt)\n relay_reserve\n buf-\u003eoffset \u003c- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[ 502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[ 502.715260] #PF: supervisor read access in kernel mode\n[ 502.715903] #PF: error_code(0x0000) - not-present page\n[ 502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[ 502.717252] Oops: 0000 [#1] SMP\n[ 502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[ 502.732872] Call Trace:\n[ 502.733193] __blk_add_trace.cold+0x137/0x1a3\n[ 502.733734] blk_add_trace_rq+0x7b/0xd0\n[ 502.734207] blk_add_trace_rq_issue+0x54/0xa0\n[ 502.734755] blk_mq_start_request+0xde/0x1b0\n[ 502.735287] scsi_queue_rq+0x528/0x1140\n...\n[ 502.742704] sg_new_write.isra.0+0x16e/0x3e0\n[ 502.747501] sg_ioctl+0x466/0x1100\n\nReproduce method:\n ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sda, BLKTRACESTART)\n ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sdb, BLKTRACESTART)\n\n echo 0 \u003e /sys/block/sdb/trace/enable \u0026\n // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n ioctl$SG_IO(/dev/sda, SG_IO, ...)\n // Enters trace_note_tsk() after blk_trace_free() returned\n // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47375",
"url": "https://www.suse.com/security/cve/CVE-2021-47375"
},
{
"category": "external",
"summary": "SUSE Bug 1225193 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "external",
"summary": "SUSE Bug 1225194 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47375"
},
{
"cve": "CVE-2021-47378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47378"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don\u0027t destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47378",
"url": "https://www.suse.com/security/cve/CVE-2021-47378"
},
{
"category": "external",
"summary": "SUSE Bug 1225201 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "external",
"summary": "SUSE Bug 1225202 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47378"
},
{
"cve": "CVE-2021-47382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47382"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47382",
"url": "https://www.suse.com/security/cve/CVE-2021-47382"
},
{
"category": "external",
"summary": "SUSE Bug 1225207 for CVE-2021-47382",
"url": "https://bugzilla.suse.com/1225207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47382"
},
{
"cve": "CVE-2021-47383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47383",
"url": "https://www.suse.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "SUSE Bug 1225208 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "external",
"summary": "SUSE Bug 1225211 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47391"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n CPU 1 CPU 2\n\nrdma_resolve_addr():\n RDMA_CM_IDLE -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler) #1\n\n\t\t\t process_one_req(): for #1\n addr_handler():\n RDMA_CM_ADDR_QUERY -\u003e RDMA_CM_ADDR_BOUND\n mutex_unlock(\u0026id_priv-\u003ehandler_mutex);\n [.. handler still running ..]\n\nrdma_resolve_addr():\n RDMA_CM_ADDR_BOUND -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler)\n !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n _destroy_id():\n cma_cancel_operation():\n rdma_addr_cancel()\n\n // process_one_req() self removes it\n\t\t spin_lock_bh(\u0026lock);\n cancel_delayed_work(\u0026req-\u003ework);\n\t if (!list_empty(\u0026req-\u003elist)) == true\n\n ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n addr_handler():\n\t mutex_lock(\u0026id_priv-\u003ehandler_mutex);\n !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn\u0027t cost anything in the normal flow\nthat never uses this strange error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47391",
"url": "https://www.suse.com/security/cve/CVE-2021-47391"
},
{
"category": "external",
"summary": "SUSE Bug 1225318 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "external",
"summary": "SUSE Bug 1225319 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47391"
},
{
"cve": "CVE-2021-47397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47397"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer\u0027s return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n Call Trace:\n \u003cIRQ\u003e\n sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n dst_input include/net/dst.h:460 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47397",
"url": "https://www.suse.com/security/cve/CVE-2021-47397"
},
{
"category": "external",
"summary": "SUSE Bug 1225082 for CVE-2021-47397",
"url": "https://bugzilla.suse.com/1225082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47397"
},
{
"cve": "CVE-2021-47400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47400"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G O 5.14.0-rc4+ #1\n[ 3078.269102] Hardware name: , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w 3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517] napi_enable+0x80/0x84\n[ 3078.424626] hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469] hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430] hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511] hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879] hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470] hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675] process_one_work+0x1dc/0x48c\n[ 3078.481888] worker_thread+0x15c/0x464\n[ 3078.487104] kthread+0x160/0x170\n[ 3078.492479] ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47400",
"url": "https://www.suse.com/security/cve/CVE-2021-47400"
},
{
"category": "external",
"summary": "SUSE Bug 1225329 for CVE-2021-47400",
"url": "https://bugzilla.suse.com/1225329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47400"
},
{
"cve": "CVE-2021-47401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47401",
"url": "https://www.suse.com/security/cve/CVE-2021-47401"
},
{
"category": "external",
"summary": "SUSE Bug 1225242 for CVE-2021-47401",
"url": "https://bugzilla.suse.com/1225242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47401"
},
{
"cve": "CVE-2021-47404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47404"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device\u0027s input is non empty before it\u0027s been used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47404",
"url": "https://www.suse.com/security/cve/CVE-2021-47404"
},
{
"category": "external",
"summary": "SUSE Bug 1225303 for CVE-2021-47404",
"url": "https://bugzilla.suse.com/1225303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47404"
},
{
"cve": "CVE-2021-47409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47409"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47409",
"url": "https://www.suse.com/security/cve/CVE-2021-47409"
},
{
"category": "external",
"summary": "SUSE Bug 1225330 for CVE-2021-47409",
"url": "https://bugzilla.suse.com/1225330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47409"
},
{
"cve": "CVE-2021-47416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47416"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus-\u003estate to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47416",
"url": "https://www.suse.com/security/cve/CVE-2021-47416"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "external",
"summary": "SUSE Bug 1225336 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47416"
},
{
"cve": "CVE-2021-47423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47423"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the \u0027op\u0027 allocated in single_open() will be leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47423",
"url": "https://www.suse.com/security/cve/CVE-2021-47423"
},
{
"category": "external",
"summary": "SUSE Bug 1225366 for CVE-2021-47423",
"url": "https://bugzilla.suse.com/1225366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47423"
},
{
"cve": "CVE-2021-47424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47424"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n Trying to free already-free IRQ 266\n WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n Workqueue: events work_for_cpu_fn\n RIP: 0010:__free_irq+0x9a/0x300\n Call Trace:\n ? synchronize_irq+0x3a/0xa0\n free_irq+0x2e/0x60\n i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n i40e_probe.part.108+0x134b/0x1a40 [i40e]\n ? kmem_cache_alloc+0x158/0x1c0\n ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n ? acpi_ut_update_object_reference+0x15e/0x1e2\n ? strstr+0x21/0x70\n ? irq_get_irq_data+0xa/0x20\n ? mp_check_pin_attr+0x13/0xc0\n ? irq_get_irq_data+0xa/0x20\n ? mp_map_pin_to_irq+0xd3/0x2f0\n ? acpi_register_gsi_ioapic+0x93/0x170\n ? pci_conf1_read+0xa4/0x100\n ? pci_bus_read_config_word+0x49/0x70\n ? do_pci_enable_device+0xcc/0x100\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x112/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47424",
"url": "https://www.suse.com/security/cve/CVE-2021-47424"
},
{
"category": "external",
"summary": "SUSE Bug 1225367 for CVE-2021-47424",
"url": "https://bugzilla.suse.com/1225367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47424"
},
{
"cve": "CVE-2021-47431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47431"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn\u0027t called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47431",
"url": "https://www.suse.com/security/cve/CVE-2021-47431"
},
{
"category": "external",
"summary": "SUSE Bug 1225390 for CVE-2021-47431",
"url": "https://bugzilla.suse.com/1225390"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47431"
},
{
"cve": "CVE-2021-47435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47435",
"url": "https://www.suse.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "SUSE Bug 1225247 for CVE-2021-47435",
"url": "https://bugzilla.suse.com/1225247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47435"
},
{
"cve": "CVE-2021-47436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n-\u003eenable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47436",
"url": "https://www.suse.com/security/cve/CVE-2021-47436"
},
{
"category": "external",
"summary": "SUSE Bug 1225244 for CVE-2021-47436",
"url": "https://bugzilla.suse.com/1225244"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47436"
},
{
"cve": "CVE-2021-47456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing \u0027chan\u0027 again after\nreleasing \u0027dev\u0027 will cause UAF.\n\nFix this by releasing \u0027dev\u0027 later.\n\nThe following log reveals it:\n\n[ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[ 35.965513 ] Call Trace:\n[ 35.965718 ] dump_stack_lvl+0xa8/0xd1\n[ 35.966028 ] print_address_description+0x87/0x3b0\n[ 35.966420 ] kasan_report+0x172/0x1c0\n[ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170\n[ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967945 ] __asan_report_load8_noabort+0x14/0x20\n[ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.968752 ] pci_device_remove+0xa9/0x250",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47456",
"url": "https://www.suse.com/security/cve/CVE-2021-47456"
},
{
"category": "external",
"summary": "SUSE Bug 1225256 for CVE-2021-47456",
"url": "https://bugzilla.suse.com/1225256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47456"
},
{
"cve": "CVE-2021-47458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47458"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below. Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated. This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n detected buffer overflow in strlen\n ------------[ cut here ]------------\n kernel BUG at lib/string.c:1149!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n Debian 5.14.6-2\n RIP: 0010:fortify_panic+0xf/0x11\n ...\n Call Trace:\n ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n mount_bdev+0x185/0x1b0\n legacy_get_tree+0x27/0x40\n vfs_get_tree+0x25/0xb0\n path_mount+0x454/0xa20\n __x64_sys_mount+0x103/0x140\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47458",
"url": "https://www.suse.com/security/cve/CVE-2021-47458"
},
{
"category": "external",
"summary": "SUSE Bug 1225252 for CVE-2021-47458",
"url": "https://bugzilla.suse.com/1225252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47458"
},
{
"cve": "CVE-2021-47460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47460"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don\u0027t invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster. However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty. So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean. So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n\u0027ocfs2_file\u0027 has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47460",
"url": "https://www.suse.com/security/cve/CVE-2021-47460"
},
{
"category": "external",
"summary": "SUSE Bug 1225251 for CVE-2021-47460",
"url": "https://bugzilla.suse.com/1225251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47460"
},
{
"cve": "CVE-2021-47469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47469"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47469",
"url": "https://www.suse.com/security/cve/CVE-2021-47469"
},
{
"category": "external",
"summary": "SUSE Bug 1225347 for CVE-2021-47469",
"url": "https://bugzilla.suse.com/1225347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47469"
},
{
"cve": "CVE-2021-47472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47472"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47472",
"url": "https://www.suse.com/security/cve/CVE-2021-47472"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47472",
"url": "https://bugzilla.suse.com/1225189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47472"
},
{
"cve": "CVE-2021-47473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47473"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n bsg_job-\u003erequest-\u003emsgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47473",
"url": "https://www.suse.com/security/cve/CVE-2021-47473"
},
{
"category": "external",
"summary": "SUSE Bug 1225192 for CVE-2021-47473",
"url": "https://bugzilla.suse.com/1225192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2021-47473"
},
{
"cve": "CVE-2021-47478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47478",
"url": "https://www.suse.com/security/cve/CVE-2021-47478"
},
{
"category": "external",
"summary": "SUSE Bug 1225198 for CVE-2021-47478",
"url": "https://bugzilla.suse.com/1225198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47478"
},
{
"cve": "CVE-2021-47480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47480"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won\u0027t be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of \u0027BUG: unable to handle page fault for address\u0027\nreported by Changhui and Yi.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47480",
"url": "https://www.suse.com/security/cve/CVE-2021-47480"
},
{
"category": "external",
"summary": "SUSE Bug 1225322 for CVE-2021-47480",
"url": "https://bugzilla.suse.com/1225322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47480"
},
{
"cve": "CVE-2021-47483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47483"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when \u0027present\u0027 realloc failed,\nthe \u0027blk\u0027 which is supposed to assign to \u0027rbnode-\u003eblock\u0027 will be freed,\nso \u0027rbnode-\u003eblock\u0027 points a freed memory, in the error handling path of\nregcache_rbtree_init(), \u0027rbnode-\u003eblock\u0027 will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode-\u003eblock to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47483",
"url": "https://www.suse.com/security/cve/CVE-2021-47483"
},
{
"category": "external",
"summary": "SUSE Bug 1224907 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "external",
"summary": "SUSE Bug 1224908 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47483"
},
{
"cve": "CVE-2021-47485",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47485"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47485",
"url": "https://www.suse.com/security/cve/CVE-2021-47485"
},
{
"category": "external",
"summary": "SUSE Bug 1224904 for CVE-2021-47485",
"url": "https://bugzilla.suse.com/1224904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47485"
},
{
"cve": "CVE-2021-47495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47495"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47495",
"url": "https://www.suse.com/security/cve/CVE-2021-47495"
},
{
"category": "external",
"summary": "SUSE Bug 1225351 for CVE-2021-47495",
"url": "https://bugzilla.suse.com/1225351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47495"
},
{
"cve": "CVE-2021-47496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47496"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk-\u003esk_err appears to expect a positive value, a convention that ktls\ndoesn\u0027t always follow and that leads to memory corruption in other code.\nFor instance,\n\n [kworker]\n tls_encrypt_done(..., err=\u003cnegative error from crypto request\u003e)\n tls_err_abort(.., err)\n sk-\u003esk_err = err;\n\n [task]\n splice_from_pipe_feed\n ...\n tls_sw_do_sendpage\n if (sk-\u003esk_err) {\n ret = -sk-\u003esk_err; // ret is positive\n\n splice_from_pipe_feed (continued)\n ret = actor(...) // ret is still positive and interpreted as bytes\n // written, resulting in underflow of buf-\u003elen and\n // sd-\u003elen, leading to huge buf-\u003eoffset and bogus\n // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47496",
"url": "https://www.suse.com/security/cve/CVE-2021-47496"
},
{
"category": "external",
"summary": "SUSE Bug 1225354 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "external",
"summary": "SUSE Bug 1227656 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1227656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47496"
},
{
"cve": "CVE-2021-47497",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47497"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47497",
"url": "https://www.suse.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "SUSE Bug 1225355 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "external",
"summary": "SUSE Bug 1227655 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1227655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47497"
},
{
"cve": "CVE-2021-47500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47500",
"url": "https://www.suse.com/security/cve/CVE-2021-47500"
},
{
"category": "external",
"summary": "SUSE Bug 1225360 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "external",
"summary": "SUSE Bug 1227698 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1227698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47500"
},
{
"cve": "CVE-2021-47506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47506",
"url": "https://www.suse.com/security/cve/CVE-2021-47506"
},
{
"category": "external",
"summary": "SUSE Bug 1225404 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "external",
"summary": "SUSE Bug 1227497 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1227497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47506"
},
{
"cve": "CVE-2021-47509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47509"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47509",
"url": "https://www.suse.com/security/cve/CVE-2021-47509"
},
{
"category": "external",
"summary": "SUSE Bug 1225409 for CVE-2021-47509",
"url": "https://bugzilla.suse.com/1225409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47509"
},
{
"cve": "CVE-2021-47511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47511"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t. Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47511",
"url": "https://www.suse.com/security/cve/CVE-2021-47511"
},
{
"category": "external",
"summary": "SUSE Bug 1225411 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "external",
"summary": "SUSE Bug 1227700 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1227700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47511"
},
{
"cve": "CVE-2021-47523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47523"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd-\u003ercvhdrtail_dummy_kvaddr = dma_alloc_coherent(\u0026dd-\u003epcidev-\u003edev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t \u0026dd-\u003ercvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd-\u003ercvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47523",
"url": "https://www.suse.com/security/cve/CVE-2021-47523"
},
{
"category": "external",
"summary": "SUSE Bug 1225438 for CVE-2021-47523",
"url": "https://bugzilla.suse.com/1225438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47523"
},
{
"cve": "CVE-2021-47541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp-\u003etx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof \u0026tmp-\u003etx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47541",
"url": "https://www.suse.com/security/cve/CVE-2021-47541"
},
{
"category": "external",
"summary": "SUSE Bug 1225453 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "external",
"summary": "SUSE Bug 1225454 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2021-47541"
},
{
"cve": "CVE-2021-47548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47548"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port \u003e= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47548",
"url": "https://www.suse.com/security/cve/CVE-2021-47548"
},
{
"category": "external",
"summary": "SUSE Bug 1225506 for CVE-2021-47548",
"url": "https://bugzilla.suse.com/1225506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47565"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost\u0027s sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47565",
"url": "https://www.suse.com/security/cve/CVE-2021-47565"
},
{
"category": "external",
"summary": "SUSE Bug 1225384 for CVE-2021-47565",
"url": "https://bugzilla.suse.com/1225384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-47565"
},
{
"cve": "CVE-2022-48686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48686",
"url": "https://www.suse.com/security/cve/CVE-2022-48686"
},
{
"category": "external",
"summary": "SUSE Bug 1223948 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "external",
"summary": "SUSE Bug 1226337 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1226337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2022-48686"
},
{
"cve": "CVE-2022-48697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48697"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48697",
"url": "https://www.suse.com/security/cve/CVE-2022-48697"
},
{
"category": "external",
"summary": "SUSE Bug 1223922 for CVE-2022-48697",
"url": "https://bugzilla.suse.com/1223922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-48697"
},
{
"cve": "CVE-2022-48704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48704"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e] ra = [\u003cffffffff81240844\u003e] ps = 0000 Tainted: G W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000\nt2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258\nt5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000\ns0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018\ns3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008\na3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338\nt8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800\nt11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000\ngp = ffffffff81d89690 sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48704",
"url": "https://www.suse.com/security/cve/CVE-2022-48704"
},
{
"category": "external",
"summary": "SUSE Bug 1223932 for CVE-2022-48704",
"url": "https://bugzilla.suse.com/1223932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-48704"
},
{
"cve": "CVE-2022-48708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48708"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48708",
"url": "https://www.suse.com/security/cve/CVE-2022-48708"
},
{
"category": "external",
"summary": "SUSE Bug 1224942 for CVE-2022-48708",
"url": "https://bugzilla.suse.com/1224942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-48708"
},
{
"cve": "CVE-2022-48710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48710",
"url": "https://www.suse.com/security/cve/CVE-2022-48710"
},
{
"category": "external",
"summary": "SUSE Bug 1225230 for CVE-2022-48710",
"url": "https://bugzilla.suse.com/1225230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2022-48710"
},
{
"cve": "CVE-2023-0160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0160"
}
],
"notes": [
{
"category": "general",
"text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0160",
"url": "https://www.suse.com/security/cve/CVE-2023-0160"
},
{
"category": "external",
"summary": "SUSE Bug 1209657 for CVE-2023-0160",
"url": "https://bugzilla.suse.com/1209657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-0160"
},
{
"cve": "CVE-2023-1829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1829"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1829",
"url": "https://www.suse.com/security/cve/CVE-2023-1829"
},
{
"category": "external",
"summary": "SUSE Bug 1210335 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "external",
"summary": "SUSE Bug 1210619 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210619"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1220886 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1220886"
},
{
"category": "external",
"summary": "SUSE Bug 1228311 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1228311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-42755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42755"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42755",
"url": "https://www.suse.com/security/cve/CVE-2023-42755"
},
{
"category": "external",
"summary": "SUSE Bug 1215702 for CVE-2023-42755",
"url": "https://bugzilla.suse.com/1215702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-47233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-47233"
}
],
"notes": [
{
"category": "general",
"text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-47233",
"url": "https://www.suse.com/security/cve/CVE-2023-47233"
},
{
"category": "external",
"summary": "SUSE Bug 1216702 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-52527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don\u0027t want to repeat the\ntransport header or account for it twice. This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff. The warning occurs when \u0027copy\u0027 is larger than\nthe amount of data in the message iterator. This is because the requested\nlength includes the transport header length when it shouldn\u0027t. This can be\ntriggered by, for example:\n\n sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n bind(sfd, ...); // ::1\n connect(sfd, ...); // ::1 port 7\n send(sfd, buffer, 4100, MSG_MORE);\n sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won\u0027t suffer from this problem as it builds\nthe UDP packet itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52527",
"url": "https://www.suse.com/security/cve/CVE-2023-52527"
},
{
"category": "external",
"summary": "SUSE Bug 1220928 for CVE-2023-52527",
"url": "https://bugzilla.suse.com/1220928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n parameter of dpu_encoder_phys.\n -Switch from atomic refcnt to a simple int counter as mutex has\n now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52586",
"url": "https://www.suse.com/security/cve/CVE-2023-52586"
},
{
"category": "external",
"summary": "SUSE Bug 1221081 for CVE-2023-52586",
"url": "https://bugzilla.suse.com/1221081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52591",
"url": "https://www.suse.com/security/cve/CVE-2023-52591"
},
{
"category": "external",
"summary": "SUSE Bug 1221044 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52655"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52655",
"url": "https://www.suse.com/security/cve/CVE-2023-52655"
},
{
"category": "external",
"summary": "SUSE Bug 1217169 for CVE-2023-52655",
"url": "https://bugzilla.suse.com/1217169"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52664"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52664",
"url": "https://www.suse.com/security/cve/CVE-2023-52664"
},
{
"category": "external",
"summary": "SUSE Bug 1224747 for CVE-2023-52664",
"url": "https://bugzilla.suse.com/1224747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52685"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52685",
"url": "https://www.suse.com/security/cve/CVE-2023-52685"
},
{
"category": "external",
"summary": "SUSE Bug 1224728 for CVE-2023-52685",
"url": "https://bugzilla.suse.com/1224728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52686",
"url": "https://www.suse.com/security/cve/CVE-2023-52686"
},
{
"category": "external",
"summary": "SUSE Bug 1224682 for CVE-2023-52686",
"url": "https://bugzilla.suse.com/1224682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52691"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev-\u003epm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52691",
"url": "https://www.suse.com/security/cve/CVE-2023-52691"
},
{
"category": "external",
"summary": "SUSE Bug 1224607 for CVE-2023-52691",
"url": "https://bugzilla.suse.com/1224607"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52696"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52696",
"url": "https://www.suse.com/security/cve/CVE-2023-52696"
},
{
"category": "external",
"summary": "SUSE Bug 1224601 for CVE-2023-52696",
"url": "https://bugzilla.suse.com/1224601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52698"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -\u003e netlbl_calipso_ops_register() function isn\u0027t called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn\u0027t free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n hex dump (first 32 bytes):\n 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c...\u003e] kmalloc include/linux/slab.h:552 [inline]\n [\u003c...\u003e] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n [\u003c...\u003e] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n [\u003c...\u003e] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n [\u003c...\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n [\u003c...\u003e] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n [\u003c...\u003e] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n [\u003c...\u003e] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n [\u003c...\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n [\u003c...\u003e] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n [\u003c...\u003e] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n [\u003c...\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n [\u003c...\u003e] sock_sendmsg+0x157/0x190 net/socket.c:671\n [\u003c...\u003e] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n [\u003c...\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n [\u003c...\u003e] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n [\u003c...\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n [\u003c...\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52698",
"url": "https://www.suse.com/security/cve/CVE-2023-52698"
},
{
"category": "external",
"summary": "SUSE Bug 1224621 for CVE-2023-52698",
"url": "https://bugzilla.suse.com/1224621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52703"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don\u0027t pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it\u0027s pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let\u0027s just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52703",
"url": "https://www.suse.com/security/cve/CVE-2023-52703"
},
{
"category": "external",
"summary": "SUSE Bug 1225549 for CVE-2023-52703",
"url": "https://bugzilla.suse.com/1225549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n hex dump (first 32 bytes):\n 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X......\n 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n hex dump (first 32 bytes):\n 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X......\n 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52730",
"url": "https://www.suse.com/security/cve/CVE-2023-52730"
},
{
"category": "external",
"summary": "SUSE Bug 1224956 for CVE-2023-52730",
"url": "https://bugzilla.suse.com/1224956"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don\u0027t know what exactly has\nhappened in MDS side. And we shouldn\u0027t continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52732",
"url": "https://www.suse.com/security/cve/CVE-2023-52732"
},
{
"category": "external",
"summary": "SUSE Bug 1225222 for CVE-2023-52732",
"url": "https://bugzilla.suse.com/1225222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52741"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata-\u003eread_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x38/0x4c\n print_report+0x16f/0x4a6\n kasan_report+0xb7/0x130\n readpages_fill_pages+0x14c/0x7e0\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n \u003c/TASK\u003e\n\n Allocated by task 2535:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x82/0x90\n cifs_readdata_direct_alloc+0x2c/0x110\n cifs_readdata_alloc+0x2d/0x60\n cifs_readahead+0x393/0xfe0\n read_pages+0x12f/0x470\n page_cache_ra_unbounded+0x1b1/0x240\n filemap_get_pages+0x1c8/0x9a0\n filemap_read+0x1c0/0x540\n cifs_strict_readv+0x21b/0x240\n vfs_read+0x395/0x4b0\n ksys_read+0xb8/0x150\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 79:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2e/0x50\n __kasan_slab_free+0x10e/0x1a0\n __kmem_cache_free+0x7a/0x1a0\n cifs_readdata_release+0x49/0x60\n process_one_work+0x46c/0x760\n worker_thread+0x2a4/0x6f0\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\n Last potentially related work creation:\n kasan_save_stack+0x22/0x50\n __kasan_record_aux_stack+0x95/0xb0\n insert_work+0x2b/0x130\n __queue_work+0x1fe/0x660\n queue_work_on+0x4b/0x60\n smb2_readv_callback+0x396/0x800\n cifs_abort_connection+0x474/0x6a0\n cifs_reconnect+0x5cb/0xa50\n cifs_readv_from_socket.cold+0x22/0x6c\n cifs_read_page_from_socket+0xc1/0x100\n readpages_fill_pages.cold+0x2f/0x46\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n cifs_readv_from_socket\n cifs_reconnect\n __cifs_reconnect\n cifs_abort_connection\n mid-\u003ecallback() --\u003e smb2_readv_callback\n queue_work(\u0026rdata-\u003ework) # if the worker completes first,\n # the rdata is freed\n cifs_readv_complete\n kref_put\n cifs_readdata_release\n kfree(rdata)\n return rdata-\u003e... # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52741",
"url": "https://www.suse.com/security/cve/CVE-2023-52741"
},
{
"category": "external",
"summary": "SUSE Bug 1225479 for CVE-2023-52741",
"url": "https://bugzilla.suse.com/1225479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52742"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite. In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn\u0027t match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52742",
"url": "https://www.suse.com/security/cve/CVE-2023-52742"
},
{
"category": "external",
"summary": "SUSE Bug 1225482 for CVE-2023-52742",
"url": "https://bugzilla.suse.com/1225482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52747",
"url": "https://www.suse.com/security/cve/CVE-2023-52747"
},
{
"category": "external",
"summary": "SUSE Bug 1224931 for CVE-2023-52747",
"url": "https://bugzilla.suse.com/1224931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52759"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52759",
"url": "https://www.suse.com/security/cve/CVE-2023-52759"
},
{
"category": "external",
"summary": "SUSE Bug 1225560 for CVE-2023-52759",
"url": "https://bugzilla.suse.com/1225560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52774"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52774",
"url": "https://www.suse.com/security/cve/CVE-2023-52774"
},
{
"category": "external",
"summary": "SUSE Bug 1225572 for CVE-2023-52774",
"url": "https://bugzilla.suse.com/1225572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52781"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52781",
"url": "https://www.suse.com/security/cve/CVE-2023-52781"
},
{
"category": "external",
"summary": "SUSE Bug 1225092 for CVE-2023-52781",
"url": "https://bugzilla.suse.com/1225092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52796"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 \u003c41\u003e 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003c#DF\u003e\n\u003c/#DF\u003e\n\u003cTASK\u003e\n[\u003cffffffff81f281d1\u003e] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[\u003cffffffff817e5bf2\u003e] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[\u003cffffffff817e5bf2\u003e] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[\u003cffffffff817e5bf2\u003e] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[\u003cffffffff817e5bf2\u003e] cpu_online include/linux/cpumask.h:1092 [inline]\n[\u003cffffffff817e5bf2\u003e] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[\u003cffffffff817e5bf2\u003e] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[\u003cffffffff8563221e\u003e] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[\u003cffffffff8561464d\u003e] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[\u003cffffffff8561464d\u003e] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[\u003cffffffff85618120\u003e] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[\u003cffffffff856f65b5\u003e] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[\u003cffffffff856f65b5\u003e] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[\u003cffffffff85618009\u003e] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[\u003cffffffff8561821a\u003e] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[\u003cffffffff838bd5a3\u003e] ip6_route_output include/net/ip6_route.h:100 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff838c2909\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84d03900\u003e] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[\u003cffffffff84d03900\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84d03900\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff84d080e2\u003e] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[\u003cffffffff855ce4cd\u003e] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[\u003cffffffff855ce4cd\u003e] neigh_hh_output include/net/neighbour.h:529 [inline]\n[\u003cf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52796",
"url": "https://www.suse.com/security/cve/CVE-2023-52796"
},
{
"category": "external",
"summary": "SUSE Bug 1224930 for CVE-2023-52796",
"url": "https://bugzilla.suse.com/1224930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[ 250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[ 250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[ 250.500549] Workqueue: events rpc_free_client_work\n[ 250.501001] Call Trace:\n[ 250.502880] kasan_report+0xb6/0xf0\n[ 250.503209] ? dget_parent+0x195/0x200\n[ 250.503561] dget_parent+0x195/0x200\n[ 250.503897] ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[ 250.504384] rpc_rmdir_depopulate+0x1b/0x90\n[ 250.504781] rpc_remove_client_dir+0xf5/0x150\n[ 250.505195] rpc_free_client_work+0xe4/0x230\n[ 250.505598] process_one_work+0x8ee/0x13b0\n...\n[ 22.039056] Allocated by task 244:\n[ 22.039390] kasan_save_stack+0x22/0x50\n[ 22.039758] kasan_set_track+0x25/0x30\n[ 22.040109] __kasan_slab_alloc+0x59/0x70\n[ 22.040487] kmem_cache_alloc_lru+0xf0/0x240\n[ 22.040889] __d_alloc+0x31/0x8e0\n[ 22.041207] d_alloc+0x44/0x1f0\n[ 22.041514] __rpc_lookup_create_exclusive+0x11c/0x140\n[ 22.041987] rpc_mkdir_populate.constprop.0+0x5f/0x110\n[ 22.042459] rpc_create_client_dir+0x34/0x150\n[ 22.042874] rpc_setup_pipedir_sb+0x102/0x1c0\n[ 22.043284] rpc_client_register+0x136/0x4e0\n[ 22.043689] rpc_new_client+0x911/0x1020\n[ 22.044057] rpc_create_xprt+0xcb/0x370\n[ 22.044417] rpc_create+0x36b/0x6c0\n...\n[ 22.049524] Freed by task 0:\n[ 22.049803] kasan_save_stack+0x22/0x50\n[ 22.050165] kasan_set_track+0x25/0x30\n[ 22.050520] kasan_save_free_info+0x2b/0x50\n[ 22.050921] __kasan_slab_free+0x10e/0x1a0\n[ 22.051306] kmem_cache_free+0xa5/0x390\n[ 22.051667] rcu_core+0x62c/0x1930\n[ 22.051995] __do_softirq+0x165/0x52a\n[ 22.052347]\n[ 22.052503] Last potentially related work creation:\n[ 22.052952] kasan_save_stack+0x22/0x50\n[ 22.053313] __kasan_record_aux_stack+0x8e/0xa0\n[ 22.053739] __call_rcu_common.constprop.0+0x6b/0x8b0\n[ 22.054209] dentry_free+0xb2/0x140\n[ 22.054540] __dentry_kill+0x3be/0x540\n[ 22.054900] shrink_dentry_list+0x199/0x510\n[ 22.055293] shrink_dcache_parent+0x190/0x240\n[ 22.055703] do_one_tree+0x11/0x40\n[ 22.056028] shrink_dcache_for_umount+0x61/0x140\n[ 22.056461] generic_shutdown_super+0x70/0x590\n[ 22.056879] kill_anon_super+0x3a/0x60\n[ 22.057234] rpc_kill_sb+0x121/0x200",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52803",
"url": "https://www.suse.com/security/cve/CVE-2023-52803"
},
{
"category": "external",
"summary": "SUSE Bug 1225008 for CVE-2023-52803",
"url": "https://bugzilla.suse.com/1225008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52821",
"url": "https://www.suse.com/security/cve/CVE-2023-52821"
},
{
"category": "external",
"summary": "SUSE Bug 1225022 for CVE-2023-52821",
"url": "https://bugzilla.suse.com/1225022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52864",
"url": "https://www.suse.com/security/cve/CVE-2023-52864"
},
{
"category": "external",
"summary": "SUSE Bug 1225132 for CVE-2023-52864",
"url": "https://bugzilla.suse.com/1225132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52865",
"url": "https://www.suse.com/security/cve/CVE-2023-52865"
},
{
"category": "external",
"summary": "SUSE Bug 1225086 for CVE-2023-52865",
"url": "https://bugzilla.suse.com/1225086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52867"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52867",
"url": "https://www.suse.com/security/cve/CVE-2023-52867"
},
{
"category": "external",
"summary": "SUSE Bug 1225009 for CVE-2023-52867",
"url": "https://bugzilla.suse.com/1225009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52875"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52875",
"url": "https://www.suse.com/security/cve/CVE-2023-52875"
},
{
"category": "external",
"summary": "SUSE Bug 1225096 for CVE-2023-52875",
"url": "https://bugzilla.suse.com/1225096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52880",
"url": "https://www.suse.com/security/cve/CVE-2023-52880"
},
{
"category": "external",
"summary": "SUSE Bug 1222619 for CVE-2023-52880",
"url": "https://bugzilla.suse.com/1222619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2024-26625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26625"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk-\u003esk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock-\u003esk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock-\u003esk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n list_empty include/linux/list.h:373 [inline]\n waitqueue_active include/linux/wait.h:127 [inline]\n sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n skb_release_all net/core/skbuff.c:1092 [inline]\n napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n napi_poll net/core/dev.c:6645 [inline]\n net_rx_action+0x956/0xe90 net/core/dev.c:6778\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e\n\nAllocated by task 5167:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3019 [inline]\n sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n alloc_inode+0x5d/0x220 fs/inode.c:260\n new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n sock_alloc+0x40/0x270 net/socket.c:634\n __sock_create+0xbc/0x800 net/socket.c:1535\n sock_create net/socket.c:1622 [inline]\n __sys_socket_create net/socket.c:1659 [inline]\n __sys_socket+0x14c/0x260 net/socket.c:1706\n __do_sys_socket net/socket.c:1720 [inline]\n __se_sys_socket net/socket.c:1718 [inline]\n __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n poison_slab_object mm/kasan/common.c:241 [inline]\n __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26625",
"url": "https://www.suse.com/security/cve/CVE-2024-26625"
},
{
"category": "external",
"summary": "SUSE Bug 1221086 for CVE-2024-26625",
"url": "https://bugzilla.suse.com/1221086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n ulen = len + skb_queue_empty(\u0026sk-\u003esk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26752",
"url": "https://www.suse.com/security/cve/CVE-2024-26752"
},
{
"category": "external",
"summary": "SUSE Bug 1222667 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "external",
"summary": "SUSE Bug 1223292 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1223292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (\u0026d-\u003elock).\nTo avoid possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n[1] lock(\u0026bdev-\u003ebd_size_lock);\n local_irq_disable();\n [2] lock(\u0026d-\u003elock);\n [3] lock(\u0026bdev-\u003ebd_size_lock);\n \u003cInterrupt\u003e\n[4] lock(\u0026d-\u003elock);\n\n *** DEADLOCK ***\n\nWhere [1](\u0026bdev-\u003ebd_size_lock) hold by zram_add()-\u003eset_capacity().\n[2]lock(\u0026d-\u003elock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](\u0026bdev-\u003ebd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(\u0026d-\u003elock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](\u0026d-\u003elock) -\u003e [3](\u0026bdev-\u003ebd_size_lock) by moving set_capacity()\noutside.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26775",
"url": "https://www.suse.com/security/cve/CVE-2024-26775"
},
{
"category": "external",
"summary": "SUSE Bug 1222627 for CVE-2024-26775",
"url": "https://bugzilla.suse.com/1222627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need. However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t. That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26828",
"url": "https://www.suse.com/security/cve/CVE-2024-26828"
},
{
"category": "external",
"summary": "SUSE Bug 1223084 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "external",
"summary": "SUSE Bug 1223363 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26846"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26846",
"url": "https://www.suse.com/security/cve/CVE-2024-26846"
},
{
"category": "external",
"summary": "SUSE Bug 1223023 for CVE-2024-26846",
"url": "https://bugzilla.suse.com/1223023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26874"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt\u0027s possible that mtk_crtc-\u003eevent is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc-\u003eevent, but in\nmtk_drm_crtc_atomic_flush(), it\u0027s is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1 CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc-\u003eevent is not null,\n step 1:\n mtk_drm_crtc_atomic_flush:\n mtk_drm_crtc_update_config(\n !!mtk_crtc-\u003eevent)\nstep 2:\nmtk_crtc_ddp_irq -\u003e\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc-\u003eevent set to null,\npending_needs_vblank set to false\nunlock\n pending_needs_vblank set to true,\n\n step 2:\n mtk_crtc_ddp_irq -\u003e\n mtk_drm_finish_page_flip called again,\n pending_needs_vblank is still true\n //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it\u0027s more\nefficient to just check if mtk_crtc-\u003eevent is null before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26874",
"url": "https://www.suse.com/security/cve/CVE-2024-26874"
},
{
"category": "external",
"summary": "SUSE Bug 1223048 for CVE-2024-26874",
"url": "https://bugzilla.suse.com/1223048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26900"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26900",
"url": "https://www.suse.com/security/cve/CVE-2024-26900"
},
{
"category": "external",
"summary": "SUSE Bug 1223046 for CVE-2024-26900",
"url": "https://bugzilla.suse.com/1223046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26915"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26915",
"url": "https://www.suse.com/security/cve/CVE-2024-26915"
},
{
"category": "external",
"summary": "SUSE Bug 1223207 for CVE-2024-26915",
"url": "https://bugzilla.suse.com/1223207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26920"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26920",
"url": "https://www.suse.com/security/cve/CVE-2024-26920"
},
{
"category": "external",
"summary": "SUSE Bug 1228237 for CVE-2024-26920",
"url": "https://bugzilla.suse.com/1228237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26921"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug. Quoting Eric:\n Calling ip_defrag() in output path is also implying skb_orphan(),\n which is buggy because output path relies on sk not disappearing.\n\n A relevant old patch about the issue was :\n 8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n [..]\n\n net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n inet socket, not an arbitrary one.\n\n If we orphan the packet in ipvlan, then downstream things like FQ\n packet scheduler will not work properly.\n\n We need to change ip_defrag() to only use skb_orphan() when really\n needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned. This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26921",
"url": "https://www.suse.com/security/cve/CVE-2024-26921"
},
{
"category": "external",
"summary": "SUSE Bug 1223138 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "external",
"summary": "SUSE Bug 1223139 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface\u0027s parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected. As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete. But usb_deauthorize_interface() can\u0027t complete\nuntil the device lock has been released, and the lock won\u0027t be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun \u003csamsun1006219@gmail.com\u003e\nReported by: xingwei lee \u003cxrivendell7@gmail.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26934",
"url": "https://www.suse.com/security/cve/CVE-2024-26934"
},
{
"category": "external",
"summary": "SUSE Bug 1223671 for CVE-2024-26934",
"url": "https://bugzilla.suse.com/1223671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26957"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n kernel: kmalloc_trace+0x3f2/0x470\n kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt]\n kernel: zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n kernel: ap_device_probe+0x15c/0x290\n kernel: really_probe+0xd2/0x468\n kernel: driver_probe_device+0x40/0xf0\n kernel: __device_attach_driver+0xc0/0x140\n kernel: bus_for_each_drv+0x8c/0xd0\n kernel: __device_attach+0x114/0x198\n kernel: bus_probe_device+0xb4/0xc8\n kernel: device_add+0x4d2/0x6e0\n kernel: ap_scan_adapter+0x3d0/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n kernel: kfree+0x37e/0x418\n kernel: zcrypt_card_put+0x54/0x80 [zcrypt]\n kernel: ap_device_remove+0x4c/0xe0\n kernel: device_release_driver_internal+0x1c4/0x270\n kernel: bus_remove_device+0x100/0x188\n kernel: device_del+0x164/0x3c0\n kernel: device_unregister+0x30/0x90\n kernel: ap_scan_adapter+0xc8/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: kthread+0x150/0x168\n kernel: __ret_from_fork+0x3c/0x58\n kernel: ret_from_fork+0xa/0x30\n kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........\n kernel: Object 00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkkhKkkk.\n kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb ........\n kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ\n kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n kernel: Call Trace:\n kernel: [\u003c00000000ca5ab5b8\u003e] dump_stack_lvl+0x90/0x120\n kernel: [\u003c00000000c99d78bc\u003e] check_bytes_and_report+0x114/0x140\n kernel: [\u003c00000000c99d53cc\u003e] check_object+0x334/0x3f8\n kernel: [\u003c00000000c99d820c\u003e] alloc_debug_processing+0xc4/0x1f8\n kernel: [\u003c00000000c99d852e\u003e] get_partial_node.part.0+0x1ee/0x3e0\n kernel: [\u003c00000000c99d94ec\u003e] ___slab_alloc+0xaf4/0x13c8\n kernel: [\u003c00000000c99d9e38\u003e] __slab_alloc.constprop.0+0x78/0xb8\n kernel: [\u003c00000000c99dc8dc\u003e] __kmalloc+0x434/0x590\n kernel: [\u003c00000000c9b4c0ce\u003e] ext4_htree_store_dirent+0x4e/0x1c0\n kernel: [\u003c00000000c9b908a2\u003e] htree_dirblock_to_tree+0x17a/0x3f0\n kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26957",
"url": "https://www.suse.com/security/cve/CVE-2024-26957"
},
{
"category": "external",
"summary": "SUSE Bug 1223666 for CVE-2024-26957",
"url": "https://bugzilla.suse.com/1223666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26958"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we\u0027re completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we\u0027re submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes. With my patch the stress test has been running for\nseveral hours without popping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26958",
"url": "https://www.suse.com/security/cve/CVE-2024-26958"
},
{
"category": "external",
"summary": "SUSE Bug 1223653 for CVE-2024-26958",
"url": "https://bugzilla.suse.com/1223653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee \u003c48\u003e 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt-\u003ememory-\u003eptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won\u0027t have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it\u0027s write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26984",
"url": "https://www.suse.com/security/cve/CVE-2024-26984"
},
{
"category": "external",
"summary": "SUSE Bug 1223633 for CVE-2024-26984",
"url": "https://bugzilla.suse.com/1223633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), \u0027in_ep\u0027 and/or \u0027out_ep\u0027 may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since \u0027in_ep\u0027 is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut \u0027dev-\u003eport_usb\u0027 associated to \u0027ncm-\u003eport\u0027 is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n usb0: eth_stop dev-\u003eport_usb=ffffff9b179c3200\n --\u003e error happens in usb_ep_enable().\n NCM: ncm_disable: ncm=ffffff9b179c3200\n --\u003e no gether_disconnect() since ncm-\u003eport.in_ep-\u003eenabled is false.\n NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n NCM: ncm_free: ncm free ncm=ffffff9b179c3200 \u003c-- released ncm\n\n[function link via configfs]\n NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n usb0: eth_open dev-\u003eport_usb=ffffff9b179c3200 \u003c-- previous released ncm\n usb0: eth_start dev-\u003eport_usb=ffffff9b179c3200 \u003c--\n eth_start_xmit()\n --\u003e dev-\u003ewrap()\n Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if \u0027ncm-\u003enetdev\u0027 is not NULL at\nncm_disable() to call gether_disconnect() to deassociate \u0027dev-\u003eport_usb\u0027.\nIt\u0027s more reasonable to check \u0027ncm-\u003enetdev\u0027 to call gether_connect/disconnect\nrather than check \u0027ncm-\u003eport.in_ep-\u003eenabled\u0027 since it might not be enabled\nbut the gether connection might be established.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26996",
"url": "https://www.suse.com/security/cve/CVE-2024-26996"
},
{
"category": "external",
"summary": "SUSE Bug 1223752 for CVE-2024-26996",
"url": "https://bugzilla.suse.com/1223752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27059",
"url": "https://www.suse.com/security/cve/CVE-2024-27059"
},
{
"category": "external",
"summary": "SUSE Bug 1223738 for CVE-2024-27059",
"url": "https://bugzilla.suse.com/1223738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS: 00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555] \u003cTASK\u003e\n[ 4562.099573] ? die_addr+0x36/0x90\n[ 4562.099583] ? exc_general_protection+0x246/0x4a0\n[ 4562.099593] ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600] ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730] nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861] nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986] nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156] ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163] ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182] ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189] nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356] __do_fault+0x32/0x150\n[ 4562.100362] do_fault+0x7c/0x560\n[ 4562.100369] __handle_mm_fault+0x800/0xc10\n[ 4562.100382] handle_mm_fault+0x17c/0x3e0\n[ 4562.100388] do_user_addr_fault+0x208/0x860\n[ 4562.100395] exc_page_fault+0x7f/0x200\n[ 4562.100402] asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446] \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27062",
"url": "https://www.suse.com/security/cve/CVE-2024-27062"
},
{
"category": "external",
"summary": "SUSE Bug 1223834 for CVE-2024-27062",
"url": "https://bugzilla.suse.com/1223834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27396"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27396",
"url": "https://www.suse.com/security/cve/CVE-2024-27396"
},
{
"category": "external",
"summary": "SUSE Bug 1224096 for CVE-2024-27396",
"url": "https://bugzilla.suse.com/1224096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n Cleanup Thread | Worker Thread\nsco_sock_release |\n sco_sock_close |\n __sco_sock_close |\n sco_sock_set_timer |\n schedule_delayed_work |\n sco_sock_kill | (wait a time)\n sock_put(sk) //FREE | sco_sock_timeout\n | sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[ 95.890016] ==================================================================\n[ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[ 95.890755] Workqueue: events sco_sock_timeout\n[ 95.890755] Call Trace:\n[ 95.890755] \u003cTASK\u003e\n[ 95.890755] dump_stack_lvl+0x45/0x110\n[ 95.890755] print_address_description+0x78/0x390\n[ 95.890755] print_report+0x11b/0x250\n[ 95.890755] ? __virt_addr_valid+0xbe/0xf0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_report+0x139/0x170\n[ 95.890755] ? update_load_avg+0xe5/0x9f0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_check_range+0x2c3/0x2e0\n[ 95.890755] sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] process_one_work+0x561/0xc50\n[ 95.890755] worker_thread+0xab2/0x13c0\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] kthread+0x279/0x300\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork+0x34/0x60\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork_asm+0x11/0x20\n[ 95.890755] \u003c/TASK\u003e\n[ 95.890755]\n[ 95.890755] Allocated by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] __kasan_kmalloc+0x86/0x90\n[ 95.890755] __kmalloc+0x17f/0x360\n[ 95.890755] sk_prot_alloc+0xe1/0x1a0\n[ 95.890755] sk_alloc+0x31/0x4e0\n[ 95.890755] bt_sock_alloc+0x2b/0x2a0\n[ 95.890755] sco_sock_create+0xad/0x320\n[ 95.890755] bt_sock_create+0x145/0x320\n[ 95.890755] __sock_create+0x2e1/0x650\n[ 95.890755] __sys_socket+0xd0/0x280\n[ 95.890755] __x64_sys_socket+0x75/0x80\n[ 95.890755] do_syscall_64+0xc4/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] Freed by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] kasan_save_free_info+0x40/0x50\n[ 95.890755] poison_slab_object+0x118/0x180\n[ 95.890755] __kasan_slab_free+0x12/0x30\n[ 95.890755] kfree+0xb2/0x240\n[ 95.890755] __sk_destruct+0x317/0x410\n[ 95.890755] sco_sock_release+0x232/0x280\n[ 95.890755] sock_close+0xb2/0x210\n[ 95.890755] __fput+0x37f/0x770\n[ 95.890755] task_work_run+0x1ae/0x210\n[ 95.890755] get_signal+0xe17/0xf70\n[ 95.890755] arch_do_signal_or_restart+0x3f/0x520\n[ 95.890755] syscall_exit_to_user_mode+0x55/0x120\n[ 95.890755] do_syscall_64+0xd1/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the object at ffff88800c388000\n[ 95.890755] which belongs to the cache kmalloc-1k of size 1024\n[ 95.890755] The buggy address is located 128 bytes inside of\n[ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the physical page:\n[ 95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 95.890755] ano\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27398",
"url": "https://www.suse.com/security/cve/CVE-2024-27398"
},
{
"category": "external",
"summary": "SUSE Bug 1224174 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "external",
"summary": "SUSE Bug 1225013 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1225013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27401",
"url": "https://www.suse.com/security/cve/CVE-2024-27401"
},
{
"category": "external",
"summary": "SUSE Bug 1224181 for CVE-2024-27401",
"url": "https://bugzilla.suse.com/1224181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27419",
"url": "https://www.suse.com/security/cve/CVE-2024-27419"
},
{
"category": "external",
"summary": "SUSE Bug 1224759 for CVE-2024-27419",
"url": "https://bugzilla.suse.com/1224759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "low"
}
],
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27436",
"url": "https://www.suse.com/security/cve/CVE-2024-27436"
},
{
"category": "external",
"summary": "SUSE Bug 1224803 for CVE-2024-27436",
"url": "https://bugzilla.suse.com/1224803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm-\u003elock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn\u0027t fully\nresolve the bug, as region-\u003epages is also dynamically allocated. I.e. the\nregion structure itself would be fine, but region-\u003epages could be freed.\n\nFlushing multiple pages under kvm-\u003elock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35791",
"url": "https://www.suse.com/security/cve/CVE-2024-35791"
},
{
"category": "external",
"summary": "SUSE Bug 1224725 for CVE-2024-35791",
"url": "https://bugzilla.suse.com/1224725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn\u0027t really\nguarantee that. It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete. In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync(). [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point. A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35809",
"url": "https://www.suse.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "SUSE Bug 1224738 for CVE-2024-35809",
"url": "https://bugzilla.suse.com/1224738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n -\u003ebrcmf_usb_probe_cb\n -\u003ebrcmf_attach\n -\u003ebrcmf_bus_started\n -\u003ebrcmf_cfg80211_attach\n -\u003ewl_init_priv\n -\u003ebrcmf_init_escan\n -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n -\u003ebrcmf_usb_disconnect_cb\n -\u003ebrcmf_detach\n -\u003ebrcmf_cfg80211_detach\n -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35811",
"url": "https://www.suse.com/security/cve/CVE-2024-35811"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2024-35811",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35830"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35830",
"url": "https://www.suse.com/security/cve/CVE-2024-35830"
},
{
"category": "external",
"summary": "SUSE Bug 1224680 for CVE-2024-35830",
"url": "https://bugzilla.suse.com/1224680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35849"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Uninit was created at:\n __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n __do_kmalloc_node mm/slub.c:3954 [inline]\n __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n kmalloc_node include/linux/slab.h:648 [inline]\n kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n kvmalloc include/linux/slab.h:766 [inline]\n init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Bytes 40-65535 of 65536 are uninitialized\n Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we\u0027re copying a \u0027struct btrfs_data_container\u0027 back\nto user-space. This btrfs_data_container is allocated in\n\u0027init_data_container()\u0027 via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35849",
"url": "https://www.suse.com/security/cve/CVE-2024-35849"
},
{
"category": "external",
"summary": "SUSE Bug 1224733 for CVE-2024-35849",
"url": "https://bugzilla.suse.com/1224733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35877"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35877",
"url": "https://www.suse.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "SUSE Bug 1224525 for CVE-2024-35877",
"url": "https://bugzilla.suse.com/1224525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35887",
"url": "https://www.suse.com/security/cve/CVE-2024-35887"
},
{
"category": "external",
"summary": "SUSE Bug 1224663 for CVE-2024-35887",
"url": "https://bugzilla.suse.com/1224663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35895"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35895",
"url": "https://www.suse.com/security/cve/CVE-2024-35895"
},
{
"category": "external",
"summary": "SUSE Bug 1224511 for CVE-2024-35895",
"url": "https://bugzilla.suse.com/1224511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35914"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35914",
"url": "https://www.suse.com/security/cve/CVE-2024-35914"
},
{
"category": "external",
"summary": "SUSE Bug 1224482 for CVE-2024-35914",
"url": "https://bugzilla.suse.com/1224482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don\u0027t check if plane-\u003estate-\u003efb == state-\u003efb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[ 110.908514] ------------[ cut here ]------------\n[ 110.908529] refcount_t: underflow; use-after-free.\n[ 110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[ 110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[ 110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G C 6.1.66-v8+ #32\n[ 110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[ 110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[ 110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[ 110.909170] sp : ffffffc00913b9c0\n[ 110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[ 110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[ 110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[ 110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[ 110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[ 110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[ 110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[ 110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[ 110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[ 110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[ 110.909434] Call trace:\n[ 110.909441] refcount_dec_not_one+0xb8/0xc0\n[ 110.909461] vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[ 110.909903] vc4_cleanup_fb+0x44/0x50 [vc4]\n[ 110.910315] drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[ 110.910669] vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[ 110.911079] commit_tail+0xb0/0x164 [drm_kms_helper]\n[ 110.911397] drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[ 110.911716] drm_atomic_commit+0xb0/0xdc [drm]\n[ 110.912569] drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[ 110.913330] drm_ioctl_kernel+0xec/0x15c [drm]\n[ 110.914091] drm_ioctl+0x24c/0x3b0 [drm]\n[ 110.914850] __arm64_sys_ioctl+0x9c/0xd4\n[ 110.914873] invoke_syscall+0x4c/0x114\n[ 110.914897] el0_svc_common+0xd0/0x118\n[ 110.914917] do_el0_svc+0x38/0xd0\n[ 110.914936] el0_svc+0x30/0x8c\n[ 110.914958] el0t_64_sync_handler+0x84/0xf0\n[ 110.914979] el0t_64_sync+0x18c/0x190\n[ 110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane-\u003estate-\u003efb == state-\u003efb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don\u0027t decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn\u0027t be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35932",
"url": "https://www.suse.com/security/cve/CVE-2024-35932"
},
{
"category": "external",
"summary": "SUSE Bug 1224650 for CVE-2024-35932",
"url": "https://bugzilla.suse.com/1224650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35935"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don\u0027t accidentally leak kernel\naddresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35935",
"url": "https://www.suse.com/security/cve/CVE-2024-35935"
},
{
"category": "external",
"summary": "SUSE Bug 1224645 for CVE-2024-35935",
"url": "https://bugzilla.suse.com/1224645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35936"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n offset -1, this is an inexact search and the key-\u003eoffset will contain\n the correct offset upon a successful search, a valid chunk tree item\n cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n item, the offset is decremented by 1 before the next loop, it\u0027s\n impossible to find a chunk item there due to alignment and size\n constraints",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35936",
"url": "https://www.suse.com/security/cve/CVE-2024-35936"
},
{
"category": "external",
"summary": "SUSE Bug 1224644 for CVE-2024-35936",
"url": "https://bugzilla.suse.com/1224644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35944",
"url": "https://www.suse.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "SUSE Bug 1224648 for CVE-2024-35944",
"url": "https://bugzilla.suse.com/1224648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35955"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE -\u003e\n MODULE_STATE_GOING -\u003e MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module-\u003estate becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module-\u003estate has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35955",
"url": "https://www.suse.com/security/cve/CVE-2024-35955"
},
{
"category": "external",
"summary": "SUSE Bug 1224676 for CVE-2024-35955",
"url": "https://bugzilla.suse.com/1224676"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35969"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(\u0026ifp-\u003eaddr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[ 41.506330] refcount_t: addition on 0; use-after-free.\n[ 41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[ 41.507413] Modules linked in: veth bridge stp llc\n[ 41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[ 41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[ 41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[ 41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 \u003c0f\u003e 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[ 41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[ 41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[ 41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[ 41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[ 41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[ 41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[ 41.514086] FS: 00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[ 41.514726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[ 41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 41.516799] Call Trace:\n[ 41.517037] \u003cTASK\u003e\n[ 41.517249] ? __warn+0x7b/0x120\n[ 41.517535] ? refcount_warn_saturate+0xa5/0x130\n[ 41.517923] ? report_bug+0x164/0x190\n[ 41.518240] ? handle_bug+0x3d/0x70\n[ 41.518541] ? exc_invalid_op+0x17/0x70\n[ 41.520972] ? asm_exc_invalid_op+0x1a/0x20\n[ 41.521325] ? refcount_warn_saturate+0xa5/0x130\n[ 41.521708] ipv6_get_ifaddr+0xda/0xe0\n[ 41.522035] inet6_rtm_getaddr+0x342/0x3f0\n[ 41.522376] ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[ 41.522758] rtnetlink_rcv_msg+0x334/0x3d0\n[ 41.523102] ? netlink_unicast+0x30f/0x390\n[ 41.523445] ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[ 41.523832] netlink_rcv_skb+0x53/0x100\n[ 41.524157] netlink_unicast+0x23b/0x390\n[ 41.524484] netlink_sendmsg+0x1f2/0x440\n[ 41.524826] __sys_sendto+0x1d8/0x1f0\n[ 41.525145] __x64_sys_sendto+0x1f/0x30\n[ 41.525467] do_syscall_64+0xa5/0x1b0\n[ 41.525794] entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[ 41.526213] RIP: 0033:0x7fbc4cfcea9a\n[ 41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[ 41.527942] RSP: 002b:00007f\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35969",
"url": "https://www.suse.com/security/cve/CVE-2024-35969"
},
{
"category": "external",
"summary": "SUSE Bug 1224580 for CVE-2024-35969",
"url": "https://bugzilla.suse.com/1224580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35982",
"url": "https://www.suse.com/security/cve/CVE-2024-35982"
},
{
"category": "external",
"summary": "SUSE Bug 1224566 for CVE-2024-35982",
"url": "https://bugzilla.suse.com/1224566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-35984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: smbus: fix NULL function pointer dereference\n\nBaruch reported an OOPS when using the designware controller as target\nonly. Target-only modes break the assumption of one transfer function\nalways being available. Fix this by always checking the pointer in\n__i2c_transfer.\n\n[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35984",
"url": "https://www.suse.com/security/cve/CVE-2024-35984"
},
{
"category": "external",
"summary": "SUSE Bug 1224567 for CVE-2024-35984",
"url": "https://bugzilla.suse.com/1224567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-36015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36015",
"url": "https://www.suse.com/security/cve/CVE-2024-36015"
},
{
"category": "external",
"summary": "SUSE Bug 1225640 for CVE-2024-36015",
"url": "https://bugzilla.suse.com/1225640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36029"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn\u0027t set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36029",
"url": "https://www.suse.com/security/cve/CVE-2024-36029"
},
{
"category": "external",
"summary": "SUSE Bug 1225708 for CVE-2024-36029",
"url": "https://bugzilla.suse.com/1225708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-36954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36954"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36954",
"url": "https://www.suse.com/security/cve/CVE-2024-36954"
},
{
"category": "external",
"summary": "SUSE Bug 1225764 for CVE-2024-36954",
"url": "https://bugzilla.suse.com/1225764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.188.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.188.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.188.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-11T07:41:39Z",
"details": "moderate"
}
],
"title": "CVE-2024-36954"
}
]
}
SUSE-SU-2024:2184-1
Vulnerability from csaf_suse - Published: 2024-06-24 18:34 - Updated: 2024-06-24 18:34Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838)
- CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246 bsc#1224831).
- CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).
- CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).
- CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47357: Fixed possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47401: Fixed stack information leak (bsc#1225242).
- CVE-2021-47423: Fixed file release memory leak (bsc#1225366).
- CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).
- CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (CVE-2022-48672 bsc#1223931).
- CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
- CVE-2022-48697: Fixed a use-after-free (bsc#1223922).
- CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).
- CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2023-52730: Fixed possible resource leaks in some error paths (bsc#1224956).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
- CVE-2023-52864: Fixed opening of char device (bsc#1225132).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26957: Fixed reference counting on zcrypt card objects (bsc#1223666).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)
- CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error (bsc#1223752).
- CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- mass-cve: Add convenience KBUILD_USER environment variable
- mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash.
- mass-cve: Fail early without data files curl >$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file.
- mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not.
- mass-cve: Make BRANCH mandatory
- mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed.
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Disable passing console lock owner completely during panic() (bsc#1197894).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- scripts/check-kernel-fix: add -F parameter
- scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually.
- scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user.
- scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list
- scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3.
- scripts/cve_tools: Update README Issue was fixed in ad3235427c3
- scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes
- scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like
- scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency.
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tls: Fix context leak on tls_device_down (bsc#1221545).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
Patchnames
SUSE-2024-2184,SUSE-SLE-HA-12-SP5-2024-2184,SUSE-SLE-Live-Patching-12-SP5-2024-2184,SUSE-SLE-SDK-12-SP5-2024-2184,SUSE-SLE-SERVER-12-SP5-2024-2184,SUSE-SLE-WE-12-SP5-2024-2184
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).\n- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).\n- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).\n- CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847)\n- CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838)\n- CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246 bsc#1224831).\n- CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880)\n- CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827)\n- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)\n- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).\n- CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).\n- CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112).\n- CVE-2021-47352: Add validation for used length (bsc#1225124).\n- CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup() (bsc#1225141).\n- CVE-2021-47357: Fixed possible use-after-free in ia_module_exit() (bsc#1225144).\n- CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).\n- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).\n- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).\n- CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)\n- CVE-2021-47401: Fixed stack information leak (bsc#1225242).\n- CVE-2021-47423: Fixed file release memory leak (bsc#1225366).\n- CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).\n- CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)\n- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).\n- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)\n- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).\n- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).\n- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)\n- CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (CVE-2022-48672 bsc#1223931).\n- CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).\n- CVE-2022-48697: Fixed a use-after-free (bsc#1223922). \n- CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).\n- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)\n- CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).\n- CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n- CVE-2023-42755: Check user supplied offsets (bsc#1215702).\n- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).\n- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).\n- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).\n- CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).\n- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)\n- CVE-2023-52730: Fixed possible resource leaks in some error paths (bsc#1224956).\n- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).\n- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)\n- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).\n- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).\n- CVE-2023-52864: Fixed opening of char device (bsc#1225132).\n- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).\n- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).\n- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)\n- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).\n- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)\n- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).\n- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).\n- CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)\n- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).\n- CVE-2024-26900: Fixed kmemleak of rdev-\u003eserial (bsc#1223046).\n- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2024-26957: Fixed reference counting on zcrypt card objects (bsc#1223666).\n- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).\n- CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)\n- CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error (bsc#1223752).\n- CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).\n- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).\n- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).\n- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)\n- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).\n- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).\n- CVE-2024-35791: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region() (bsc#1224725).\n- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).\n- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).\n- CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).\n- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).\n- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).\n- CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)\n- CVE-2024-35932: Do not check if plane-\u003estate-\u003efb == state-\u003efb (bsc#1224650).\n- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)\n- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)\n- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).\n- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).\n- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)\n- CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)\n\nThe following non-security bugs were fixed:\n\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect.\n- autofs: fix a leak in autofs_expire_indirect() (git-fixes)\n- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).\n- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)\n- btrfs: check if root is readonly while setting security xattr (git-fixes)\n- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)\n- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)\n- btrfs: do not stop integrity writeback too early (git-fixes)\n- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)\n- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)\n- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)\n- btrfs: fix deadlock when writing out space cache (git-fixes)\n- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)\n- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)\n- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)\n- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)\n- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)\n- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)\n- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)\n- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)\n- btrfs: fix unaligned access in readdir (git-fixes)\n- btrfs: limit device extents to the device size (git-fixes)\n- btrfs: prevent to set invalid default subvolid (git-fixes)\n- btrfs: record delayed inode root in transaction (git-fixes)\n- btrfs: scrub: reject unsupported scrub flags (git-fixes)\n- btrfs: send: ensure send_fd is writable (git-fixes)\n- btrfs: send: in case of IO error log it (git-fixes)\n- btrfs: send: limit number of clones and allocated memory size (git-fixes)\n- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include\n- btrfs: tree-checker: add missing return after error in root_item (git-fixes)\n- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)\n- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)\n- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)\n- btrfs: tree-checker: Fix misleading group system information (git-fixes)\n- btrfs: undo writable superblocke when sprouting fails (git-fixes)\n- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)\n- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)\n- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)\n- ecryptfs: fix kernel panic with null dev_name (git-fixes)\n- ecryptfs: Fix typo in message (git-fixes)\n- ep_create_wakeup_source(): dentry name can change under you (git-fixes)\n- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)\n- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)\n- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)\n- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).\n- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).\n- l2tp: pass correct message length to ip6_append_data (git-fixes).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- mass-cve: Add convenience KBUILD_USER environment variable\n- mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX\u0027d /bin/sh. Switch to explicit bash.\n- mass-cve: Fail early without data files curl \u003e$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file.\n- mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not.\n- mass-cve: Make BRANCH mandatory\n- mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed.\n- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).\n- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).\n- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).\n- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).\n- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).\n- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).\n- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).\n- net: usb: ax88179_178a: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: smsc95xx: stop lying about skb-\u003etruesize (git-fixes).\n- net: usb: sr9700: stop lying about skb-\u003etruesize (git-fixes).\n- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).\n- nfc: change order inside nfc_se_io error path (git-fixes).\n- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).\n- ppdev: Add an error check in register_device (git-fixes).\n- printk: Disable passing console lock owner completely during panic() (bsc#1197894).\n- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).\n- rds: avoid unenecessary cong_update in loop transport (git-fixes).\n- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).\n- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).\n- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).\n- rxrpc: Do not put crypto buffers on the stack (git-fixes).\n- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).\n- rxrpc: Provide a different lockdep key for call-\u003euser_mutex for kernel calls (git-fixes).\n- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).\n- rxrpc: Work around usercopy check (git-fixes).\n- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).\n- scripts/check-kernel-fix: add -F parameter\n- scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually.\n- scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user.\n- scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list\n- scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3.\n- scripts/cve_tools: Update README Issue was fixed in ad3235427c3\n- scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes\n- scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like \n- scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency.\n- tcp: tcp_make_synack() can be called from process context (git-fixes).\n- tls: Fix context leak on tls_device_down (bsc#1221545).\n- tracing: Fix blocked reader of snapshot buffer (git-fixes).\n- tracing: hide unused ftrace_event_id_fops (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).\n- usb: aqc111: stop lying about skb-\u003etruesize (git-fixes).\n- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).\n- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2184,SUSE-SLE-HA-12-SP5-2024-2184,SUSE-SLE-Live-Patching-12-SP5-2024-2184,SUSE-SLE-SDK-12-SP5-2024-2184,SUSE-SLE-SERVER-12-SP5-2024-2184,SUSE-SLE-WE-12-SP5-2024-2184",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2184-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2184-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242184-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2184-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1141539",
"url": "https://bugzilla.suse.com/1141539"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1185902",
"url": "https://bugzilla.suse.com/1185902"
},
{
"category": "self",
"summary": "SUSE Bug 1187716",
"url": "https://bugzilla.suse.com/1187716"
},
{
"category": "self",
"summary": "SUSE Bug 1188616",
"url": "https://bugzilla.suse.com/1188616"
},
{
"category": "self",
"summary": "SUSE Bug 1190317",
"url": "https://bugzilla.suse.com/1190317"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191452",
"url": "https://bugzilla.suse.com/1191452"
},
{
"category": "self",
"summary": "SUSE Bug 1194591",
"url": "https://bugzilla.suse.com/1194591"
},
{
"category": "self",
"summary": "SUSE Bug 1197760",
"url": "https://bugzilla.suse.com/1197760"
},
{
"category": "self",
"summary": "SUSE Bug 1197894",
"url": "https://bugzilla.suse.com/1197894"
},
{
"category": "self",
"summary": "SUSE Bug 1203935",
"url": "https://bugzilla.suse.com/1203935"
},
{
"category": "self",
"summary": "SUSE Bug 1206213",
"url": "https://bugzilla.suse.com/1206213"
},
{
"category": "self",
"summary": "SUSE Bug 1206646",
"url": "https://bugzilla.suse.com/1206646"
},
{
"category": "self",
"summary": "SUSE Bug 1207186",
"url": "https://bugzilla.suse.com/1207186"
},
{
"category": "self",
"summary": "SUSE Bug 1209657",
"url": "https://bugzilla.suse.com/1209657"
},
{
"category": "self",
"summary": "SUSE Bug 1210335",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "self",
"summary": "SUSE Bug 1215702",
"url": "https://bugzilla.suse.com/1215702"
},
{
"category": "self",
"summary": "SUSE Bug 1216702",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "self",
"summary": "SUSE Bug 1217169",
"url": "https://bugzilla.suse.com/1217169"
},
{
"category": "self",
"summary": "SUSE Bug 1217519",
"url": "https://bugzilla.suse.com/1217519"
},
{
"category": "self",
"summary": "SUSE Bug 1218917",
"url": "https://bugzilla.suse.com/1218917"
},
{
"category": "self",
"summary": "SUSE Bug 1220487",
"url": "https://bugzilla.suse.com/1220487"
},
{
"category": "self",
"summary": "SUSE Bug 1220513",
"url": "https://bugzilla.suse.com/1220513"
},
{
"category": "self",
"summary": "SUSE Bug 1220854",
"url": "https://bugzilla.suse.com/1220854"
},
{
"category": "self",
"summary": "SUSE Bug 1220928",
"url": "https://bugzilla.suse.com/1220928"
},
{
"category": "self",
"summary": "SUSE Bug 1221044",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "self",
"summary": "SUSE Bug 1221081",
"url": "https://bugzilla.suse.com/1221081"
},
{
"category": "self",
"summary": "SUSE Bug 1221086",
"url": "https://bugzilla.suse.com/1221086"
},
{
"category": "self",
"summary": "SUSE Bug 1221543",
"url": "https://bugzilla.suse.com/1221543"
},
{
"category": "self",
"summary": "SUSE Bug 1221545",
"url": "https://bugzilla.suse.com/1221545"
},
{
"category": "self",
"summary": "SUSE Bug 1221816",
"url": "https://bugzilla.suse.com/1221816"
},
{
"category": "self",
"summary": "SUSE Bug 1221977",
"url": "https://bugzilla.suse.com/1221977"
},
{
"category": "self",
"summary": "SUSE Bug 1221994",
"url": "https://bugzilla.suse.com/1221994"
},
{
"category": "self",
"summary": "SUSE Bug 1222559",
"url": "https://bugzilla.suse.com/1222559"
},
{
"category": "self",
"summary": "SUSE Bug 1222619",
"url": "https://bugzilla.suse.com/1222619"
},
{
"category": "self",
"summary": "SUSE Bug 1222627",
"url": "https://bugzilla.suse.com/1222627"
},
{
"category": "self",
"summary": "SUSE Bug 1222667",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "self",
"summary": "SUSE Bug 1222671",
"url": "https://bugzilla.suse.com/1222671"
},
{
"category": "self",
"summary": "SUSE Bug 1222793",
"url": "https://bugzilla.suse.com/1222793"
},
{
"category": "self",
"summary": "SUSE Bug 1222893",
"url": "https://bugzilla.suse.com/1222893"
},
{
"category": "self",
"summary": "SUSE Bug 1222894",
"url": "https://bugzilla.suse.com/1222894"
},
{
"category": "self",
"summary": "SUSE Bug 1223023",
"url": "https://bugzilla.suse.com/1223023"
},
{
"category": "self",
"summary": "SUSE Bug 1223046",
"url": "https://bugzilla.suse.com/1223046"
},
{
"category": "self",
"summary": "SUSE Bug 1223048",
"url": "https://bugzilla.suse.com/1223048"
},
{
"category": "self",
"summary": "SUSE Bug 1223062",
"url": "https://bugzilla.suse.com/1223062"
},
{
"category": "self",
"summary": "SUSE Bug 1223084",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "self",
"summary": "SUSE Bug 1223119",
"url": "https://bugzilla.suse.com/1223119"
},
{
"category": "self",
"summary": "SUSE Bug 1223138",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "self",
"summary": "SUSE Bug 1223207",
"url": "https://bugzilla.suse.com/1223207"
},
{
"category": "self",
"summary": "SUSE Bug 1223360",
"url": "https://bugzilla.suse.com/1223360"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1223432",
"url": "https://bugzilla.suse.com/1223432"
},
{
"category": "self",
"summary": "SUSE Bug 1223509",
"url": "https://bugzilla.suse.com/1223509"
},
{
"category": "self",
"summary": "SUSE Bug 1223512",
"url": "https://bugzilla.suse.com/1223512"
},
{
"category": "self",
"summary": "SUSE Bug 1223539",
"url": "https://bugzilla.suse.com/1223539"
},
{
"category": "self",
"summary": "SUSE Bug 1223540",
"url": "https://bugzilla.suse.com/1223540"
},
{
"category": "self",
"summary": "SUSE Bug 1223626",
"url": "https://bugzilla.suse.com/1223626"
},
{
"category": "self",
"summary": "SUSE Bug 1223627",
"url": "https://bugzilla.suse.com/1223627"
},
{
"category": "self",
"summary": "SUSE Bug 1223633",
"url": "https://bugzilla.suse.com/1223633"
},
{
"category": "self",
"summary": "SUSE Bug 1223653",
"url": "https://bugzilla.suse.com/1223653"
},
{
"category": "self",
"summary": "SUSE Bug 1223666",
"url": "https://bugzilla.suse.com/1223666"
},
{
"category": "self",
"summary": "SUSE Bug 1223671",
"url": "https://bugzilla.suse.com/1223671"
},
{
"category": "self",
"summary": "SUSE Bug 1223712",
"url": "https://bugzilla.suse.com/1223712"
},
{
"category": "self",
"summary": "SUSE Bug 1223715",
"url": "https://bugzilla.suse.com/1223715"
},
{
"category": "self",
"summary": "SUSE Bug 1223738",
"url": "https://bugzilla.suse.com/1223738"
},
{
"category": "self",
"summary": "SUSE Bug 1223744",
"url": "https://bugzilla.suse.com/1223744"
},
{
"category": "self",
"summary": "SUSE Bug 1223752",
"url": "https://bugzilla.suse.com/1223752"
},
{
"category": "self",
"summary": "SUSE Bug 1223802",
"url": "https://bugzilla.suse.com/1223802"
},
{
"category": "self",
"summary": "SUSE Bug 1223819",
"url": "https://bugzilla.suse.com/1223819"
},
{
"category": "self",
"summary": "SUSE Bug 1223834",
"url": "https://bugzilla.suse.com/1223834"
},
{
"category": "self",
"summary": "SUSE Bug 1223922",
"url": "https://bugzilla.suse.com/1223922"
},
{
"category": "self",
"summary": "SUSE Bug 1223923",
"url": "https://bugzilla.suse.com/1223923"
},
{
"category": "self",
"summary": "SUSE Bug 1223931",
"url": "https://bugzilla.suse.com/1223931"
},
{
"category": "self",
"summary": "SUSE Bug 1223932",
"url": "https://bugzilla.suse.com/1223932"
},
{
"category": "self",
"summary": "SUSE Bug 1223948",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "self",
"summary": "SUSE Bug 1223969",
"url": "https://bugzilla.suse.com/1223969"
},
{
"category": "self",
"summary": "SUSE Bug 1224096",
"url": "https://bugzilla.suse.com/1224096"
},
{
"category": "self",
"summary": "SUSE Bug 1224174",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "self",
"summary": "SUSE Bug 1224181",
"url": "https://bugzilla.suse.com/1224181"
},
{
"category": "self",
"summary": "SUSE Bug 1224347",
"url": "https://bugzilla.suse.com/1224347"
},
{
"category": "self",
"summary": "SUSE Bug 1224482",
"url": "https://bugzilla.suse.com/1224482"
},
{
"category": "self",
"summary": "SUSE Bug 1224511",
"url": "https://bugzilla.suse.com/1224511"
},
{
"category": "self",
"summary": "SUSE Bug 1224525",
"url": "https://bugzilla.suse.com/1224525"
},
{
"category": "self",
"summary": "SUSE Bug 1224566",
"url": "https://bugzilla.suse.com/1224566"
},
{
"category": "self",
"summary": "SUSE Bug 1224580",
"url": "https://bugzilla.suse.com/1224580"
},
{
"category": "self",
"summary": "SUSE Bug 1224592",
"url": "https://bugzilla.suse.com/1224592"
},
{
"category": "self",
"summary": "SUSE Bug 1224601",
"url": "https://bugzilla.suse.com/1224601"
},
{
"category": "self",
"summary": "SUSE Bug 1224607",
"url": "https://bugzilla.suse.com/1224607"
},
{
"category": "self",
"summary": "SUSE Bug 1224621",
"url": "https://bugzilla.suse.com/1224621"
},
{
"category": "self",
"summary": "SUSE Bug 1224644",
"url": "https://bugzilla.suse.com/1224644"
},
{
"category": "self",
"summary": "SUSE Bug 1224645",
"url": "https://bugzilla.suse.com/1224645"
},
{
"category": "self",
"summary": "SUSE Bug 1224648",
"url": "https://bugzilla.suse.com/1224648"
},
{
"category": "self",
"summary": "SUSE Bug 1224650",
"url": "https://bugzilla.suse.com/1224650"
},
{
"category": "self",
"summary": "SUSE Bug 1224663",
"url": "https://bugzilla.suse.com/1224663"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224676",
"url": "https://bugzilla.suse.com/1224676"
},
{
"category": "self",
"summary": "SUSE Bug 1224680",
"url": "https://bugzilla.suse.com/1224680"
},
{
"category": "self",
"summary": "SUSE Bug 1224682",
"url": "https://bugzilla.suse.com/1224682"
},
{
"category": "self",
"summary": "SUSE Bug 1224725",
"url": "https://bugzilla.suse.com/1224725"
},
{
"category": "self",
"summary": "SUSE Bug 1224728",
"url": "https://bugzilla.suse.com/1224728"
},
{
"category": "self",
"summary": "SUSE Bug 1224733",
"url": "https://bugzilla.suse.com/1224733"
},
{
"category": "self",
"summary": "SUSE Bug 1224738",
"url": "https://bugzilla.suse.com/1224738"
},
{
"category": "self",
"summary": "SUSE Bug 1224747",
"url": "https://bugzilla.suse.com/1224747"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224759",
"url": "https://bugzilla.suse.com/1224759"
},
{
"category": "self",
"summary": "SUSE Bug 1224803",
"url": "https://bugzilla.suse.com/1224803"
},
{
"category": "self",
"summary": "SUSE Bug 1224827",
"url": "https://bugzilla.suse.com/1224827"
},
{
"category": "self",
"summary": "SUSE Bug 1224830",
"url": "https://bugzilla.suse.com/1224830"
},
{
"category": "self",
"summary": "SUSE Bug 1224831",
"url": "https://bugzilla.suse.com/1224831"
},
{
"category": "self",
"summary": "SUSE Bug 1224834",
"url": "https://bugzilla.suse.com/1224834"
},
{
"category": "self",
"summary": "SUSE Bug 1224838",
"url": "https://bugzilla.suse.com/1224838"
},
{
"category": "self",
"summary": "SUSE Bug 1224841",
"url": "https://bugzilla.suse.com/1224841"
},
{
"category": "self",
"summary": "SUSE Bug 1224844",
"url": "https://bugzilla.suse.com/1224844"
},
{
"category": "self",
"summary": "SUSE Bug 1224846",
"url": "https://bugzilla.suse.com/1224846"
},
{
"category": "self",
"summary": "SUSE Bug 1224847",
"url": "https://bugzilla.suse.com/1224847"
},
{
"category": "self",
"summary": "SUSE Bug 1224849",
"url": "https://bugzilla.suse.com/1224849"
},
{
"category": "self",
"summary": "SUSE Bug 1224854",
"url": "https://bugzilla.suse.com/1224854"
},
{
"category": "self",
"summary": "SUSE Bug 1224859",
"url": "https://bugzilla.suse.com/1224859"
},
{
"category": "self",
"summary": "SUSE Bug 1224867",
"url": "https://bugzilla.suse.com/1224867"
},
{
"category": "self",
"summary": "SUSE Bug 1224880",
"url": "https://bugzilla.suse.com/1224880"
},
{
"category": "self",
"summary": "SUSE Bug 1224882",
"url": "https://bugzilla.suse.com/1224882"
},
{
"category": "self",
"summary": "SUSE Bug 1224888",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "self",
"summary": "SUSE Bug 1224889",
"url": "https://bugzilla.suse.com/1224889"
},
{
"category": "self",
"summary": "SUSE Bug 1224892",
"url": "https://bugzilla.suse.com/1224892"
},
{
"category": "self",
"summary": "SUSE Bug 1224893",
"url": "https://bugzilla.suse.com/1224893"
},
{
"category": "self",
"summary": "SUSE Bug 1224899",
"url": "https://bugzilla.suse.com/1224899"
},
{
"category": "self",
"summary": "SUSE Bug 1224904",
"url": "https://bugzilla.suse.com/1224904"
},
{
"category": "self",
"summary": "SUSE Bug 1224907",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "self",
"summary": "SUSE Bug 1224916",
"url": "https://bugzilla.suse.com/1224916"
},
{
"category": "self",
"summary": "SUSE Bug 1224917",
"url": "https://bugzilla.suse.com/1224917"
},
{
"category": "self",
"summary": "SUSE Bug 1224922",
"url": "https://bugzilla.suse.com/1224922"
},
{
"category": "self",
"summary": "SUSE Bug 1224926",
"url": "https://bugzilla.suse.com/1224926"
},
{
"category": "self",
"summary": "SUSE Bug 1224930",
"url": "https://bugzilla.suse.com/1224930"
},
{
"category": "self",
"summary": "SUSE Bug 1224931",
"url": "https://bugzilla.suse.com/1224931"
},
{
"category": "self",
"summary": "SUSE Bug 1224942",
"url": "https://bugzilla.suse.com/1224942"
},
{
"category": "self",
"summary": "SUSE Bug 1224954",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "self",
"summary": "SUSE Bug 1224956",
"url": "https://bugzilla.suse.com/1224956"
},
{
"category": "self",
"summary": "SUSE Bug 1224957",
"url": "https://bugzilla.suse.com/1224957"
},
{
"category": "self",
"summary": "SUSE Bug 1224959",
"url": "https://bugzilla.suse.com/1224959"
},
{
"category": "self",
"summary": "SUSE Bug 1224960",
"url": "https://bugzilla.suse.com/1224960"
},
{
"category": "self",
"summary": "SUSE Bug 1224961",
"url": "https://bugzilla.suse.com/1224961"
},
{
"category": "self",
"summary": "SUSE Bug 1224963",
"url": "https://bugzilla.suse.com/1224963"
},
{
"category": "self",
"summary": "SUSE Bug 1224966",
"url": "https://bugzilla.suse.com/1224966"
},
{
"category": "self",
"summary": "SUSE Bug 1224968",
"url": "https://bugzilla.suse.com/1224968"
},
{
"category": "self",
"summary": "SUSE Bug 1224981",
"url": "https://bugzilla.suse.com/1224981"
},
{
"category": "self",
"summary": "SUSE Bug 1224982",
"url": "https://bugzilla.suse.com/1224982"
},
{
"category": "self",
"summary": "SUSE Bug 1224983",
"url": "https://bugzilla.suse.com/1224983"
},
{
"category": "self",
"summary": "SUSE Bug 1224987",
"url": "https://bugzilla.suse.com/1224987"
},
{
"category": "self",
"summary": "SUSE Bug 1224990",
"url": "https://bugzilla.suse.com/1224990"
},
{
"category": "self",
"summary": "SUSE Bug 1224996",
"url": "https://bugzilla.suse.com/1224996"
},
{
"category": "self",
"summary": "SUSE Bug 1225008",
"url": "https://bugzilla.suse.com/1225008"
},
{
"category": "self",
"summary": "SUSE Bug 1225009",
"url": "https://bugzilla.suse.com/1225009"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225022",
"url": "https://bugzilla.suse.com/1225022"
},
{
"category": "self",
"summary": "SUSE Bug 1225026",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "self",
"summary": "SUSE Bug 1225030",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "self",
"summary": "SUSE Bug 1225054",
"url": "https://bugzilla.suse.com/1225054"
},
{
"category": "self",
"summary": "SUSE Bug 1225058",
"url": "https://bugzilla.suse.com/1225058"
},
{
"category": "self",
"summary": "SUSE Bug 1225059",
"url": "https://bugzilla.suse.com/1225059"
},
{
"category": "self",
"summary": "SUSE Bug 1225060",
"url": "https://bugzilla.suse.com/1225060"
},
{
"category": "self",
"summary": "SUSE Bug 1225062",
"url": "https://bugzilla.suse.com/1225062"
},
{
"category": "self",
"summary": "SUSE Bug 1225082",
"url": "https://bugzilla.suse.com/1225082"
},
{
"category": "self",
"summary": "SUSE Bug 1225084",
"url": "https://bugzilla.suse.com/1225084"
},
{
"category": "self",
"summary": "SUSE Bug 1225086",
"url": "https://bugzilla.suse.com/1225086"
},
{
"category": "self",
"summary": "SUSE Bug 1225092",
"url": "https://bugzilla.suse.com/1225092"
},
{
"category": "self",
"summary": "SUSE Bug 1225096",
"url": "https://bugzilla.suse.com/1225096"
},
{
"category": "self",
"summary": "SUSE Bug 1225112",
"url": "https://bugzilla.suse.com/1225112"
},
{
"category": "self",
"summary": "SUSE Bug 1225124",
"url": "https://bugzilla.suse.com/1225124"
},
{
"category": "self",
"summary": "SUSE Bug 1225128",
"url": "https://bugzilla.suse.com/1225128"
},
{
"category": "self",
"summary": "SUSE Bug 1225132",
"url": "https://bugzilla.suse.com/1225132"
},
{
"category": "self",
"summary": "SUSE Bug 1225141",
"url": "https://bugzilla.suse.com/1225141"
},
{
"category": "self",
"summary": "SUSE Bug 1225143",
"url": "https://bugzilla.suse.com/1225143"
},
{
"category": "self",
"summary": "SUSE Bug 1225144",
"url": "https://bugzilla.suse.com/1225144"
},
{
"category": "self",
"summary": "SUSE Bug 1225151",
"url": "https://bugzilla.suse.com/1225151"
},
{
"category": "self",
"summary": "SUSE Bug 1225153",
"url": "https://bugzilla.suse.com/1225153"
},
{
"category": "self",
"summary": "SUSE Bug 1225155",
"url": "https://bugzilla.suse.com/1225155"
},
{
"category": "self",
"summary": "SUSE Bug 1225157",
"url": "https://bugzilla.suse.com/1225157"
},
{
"category": "self",
"summary": "SUSE Bug 1225164",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "self",
"summary": "SUSE Bug 1225177",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "self",
"summary": "SUSE Bug 1225189",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "self",
"summary": "SUSE Bug 1225192",
"url": "https://bugzilla.suse.com/1225192"
},
{
"category": "self",
"summary": "SUSE Bug 1225193",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "self",
"summary": "SUSE Bug 1225198",
"url": "https://bugzilla.suse.com/1225198"
},
{
"category": "self",
"summary": "SUSE Bug 1225201",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "self",
"summary": "SUSE Bug 1225207",
"url": "https://bugzilla.suse.com/1225207"
},
{
"category": "self",
"summary": "SUSE Bug 1225208",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "self",
"summary": "SUSE Bug 1225222",
"url": "https://bugzilla.suse.com/1225222"
},
{
"category": "self",
"summary": "SUSE Bug 1225230",
"url": "https://bugzilla.suse.com/1225230"
},
{
"category": "self",
"summary": "SUSE Bug 1225242",
"url": "https://bugzilla.suse.com/1225242"
},
{
"category": "self",
"summary": "SUSE Bug 1225244",
"url": "https://bugzilla.suse.com/1225244"
},
{
"category": "self",
"summary": "SUSE Bug 1225247",
"url": "https://bugzilla.suse.com/1225247"
},
{
"category": "self",
"summary": "SUSE Bug 1225251",
"url": "https://bugzilla.suse.com/1225251"
},
{
"category": "self",
"summary": "SUSE Bug 1225252",
"url": "https://bugzilla.suse.com/1225252"
},
{
"category": "self",
"summary": "SUSE Bug 1225256",
"url": "https://bugzilla.suse.com/1225256"
},
{
"category": "self",
"summary": "SUSE Bug 1225303",
"url": "https://bugzilla.suse.com/1225303"
},
{
"category": "self",
"summary": "SUSE Bug 1225318",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "self",
"summary": "SUSE Bug 1225322",
"url": "https://bugzilla.suse.com/1225322"
},
{
"category": "self",
"summary": "SUSE Bug 1225329",
"url": "https://bugzilla.suse.com/1225329"
},
{
"category": "self",
"summary": "SUSE Bug 1225330",
"url": "https://bugzilla.suse.com/1225330"
},
{
"category": "self",
"summary": "SUSE Bug 1225336",
"url": "https://bugzilla.suse.com/1225336"
},
{
"category": "self",
"summary": "SUSE Bug 1225347",
"url": "https://bugzilla.suse.com/1225347"
},
{
"category": "self",
"summary": "SUSE Bug 1225351",
"url": "https://bugzilla.suse.com/1225351"
},
{
"category": "self",
"summary": "SUSE Bug 1225354",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "self",
"summary": "SUSE Bug 1225355",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "self",
"summary": "SUSE Bug 1225360",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "self",
"summary": "SUSE Bug 1225366",
"url": "https://bugzilla.suse.com/1225366"
},
{
"category": "self",
"summary": "SUSE Bug 1225367",
"url": "https://bugzilla.suse.com/1225367"
},
{
"category": "self",
"summary": "SUSE Bug 1225384",
"url": "https://bugzilla.suse.com/1225384"
},
{
"category": "self",
"summary": "SUSE Bug 1225390",
"url": "https://bugzilla.suse.com/1225390"
},
{
"category": "self",
"summary": "SUSE Bug 1225404",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "self",
"summary": "SUSE Bug 1225409",
"url": "https://bugzilla.suse.com/1225409"
},
{
"category": "self",
"summary": "SUSE Bug 1225411",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "self",
"summary": "SUSE Bug 1225438",
"url": "https://bugzilla.suse.com/1225438"
},
{
"category": "self",
"summary": "SUSE Bug 1225453",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "self",
"summary": "SUSE Bug 1225479",
"url": "https://bugzilla.suse.com/1225479"
},
{
"category": "self",
"summary": "SUSE Bug 1225482",
"url": "https://bugzilla.suse.com/1225482"
},
{
"category": "self",
"summary": "SUSE Bug 1225506",
"url": "https://bugzilla.suse.com/1225506"
},
{
"category": "self",
"summary": "SUSE Bug 1225549",
"url": "https://bugzilla.suse.com/1225549"
},
{
"category": "self",
"summary": "SUSE Bug 1225560",
"url": "https://bugzilla.suse.com/1225560"
},
{
"category": "self",
"summary": "SUSE Bug 1225572",
"url": "https://bugzilla.suse.com/1225572"
},
{
"category": "self",
"summary": "SUSE Bug 1225640",
"url": "https://bugzilla.suse.com/1225640"
},
{
"category": "self",
"summary": "SUSE Bug 1225708",
"url": "https://bugzilla.suse.com/1225708"
},
{
"category": "self",
"summary": "SUSE Bug 1225764",
"url": "https://bugzilla.suse.com/1225764"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46933 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46955 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47074 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47113 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47131 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47162 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47171 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47188 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47206 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47220 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47229 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47231 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47235 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47236 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47237 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47238 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47239 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47245 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47246 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47246/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47248 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47249 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47250 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47254 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47258 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47260 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47261 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47269 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47274 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47276 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47277 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47280 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47281 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47284 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47285 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47288 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47301 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47302 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47305 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47307 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47308 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47310 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47314 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47315 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47319 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47320 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47323 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47324 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47330 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47334 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47337 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47343 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47344 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47347 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47352 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47353 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47355 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47356 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47357 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47361 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47362 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47369 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47391 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47397 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47400 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47401 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47404 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47409 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47423 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47424 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47431 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47435 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47436 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47456 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47458 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47460 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47469 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47472 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47473 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47478 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47480 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47485 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47485/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47495 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47496 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47496/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47497 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47497/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47500 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47509 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47511 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47523 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47541 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47548 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47565 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48636 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48650 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48672 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48686 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48697 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48702 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48704 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48708 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48710 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0160 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1829 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42755 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-47233 page",
"url": "https://www.suse.com/security/cve/CVE-2023-47233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52527 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52586 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52591 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52646 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52653 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52655 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52664 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52685 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52686 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52691 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52696 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52698 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52703 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52730 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52741 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52742 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52747 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52759 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52774 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52781 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52796 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52821 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52864 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52865 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52867 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52875 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52880 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0639 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26625 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26739 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26752 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26791 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26828 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26846 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26874 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26876 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26900 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26915 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26920 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26921 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26929 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26930 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26931 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26957 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26984 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26996 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27008 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27054 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27062 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27388 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27396 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27398 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27401 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27419 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27436 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35791 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35809 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35811 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35830 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35849 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35877 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35895 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35914 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35932 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35935 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35936 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35944 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35955 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35969 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35982 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36015 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36029 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36954 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36954/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-06-24T18:34:20Z",
"generator": {
"date": "2024-06-24T18:34:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2184-1",
"initial_release_date": "2024-06-24T18:34:20Z",
"revision_history": [
{
"date": "2024-06-24T18:34:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.219.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.219.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.219.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.219.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.219.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.219.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.219.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.219.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.219.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.219.1.noarch",
"product_id": "kernel-devel-4.12.14-122.219.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.219.1.noarch",
"product_id": "kernel-docs-4.12.14-122.219.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.219.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.219.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.219.1.noarch",
"product_id": "kernel-macros-4.12.14-122.219.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.219.1.noarch",
"product_id": "kernel-source-4.12.14-122.219.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.219.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.219.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.219.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.219.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.219.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.219.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.219.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.219.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.219.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.219.1.s390x",
"product_id": "kernel-syms-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.219.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.219.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.219.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.219.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.219.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.219.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.219.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.219.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.219.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.219.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.219.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.219.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.219.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.219.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.219.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.219.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.219.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.219.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.219.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.219.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.219.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.219.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46933"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function\u0027s USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear \u003e set_ftrace_filter\n/sys/kernel/debug/tracing# echo function \u003e current_tracer\n/sys/kernel/debug/tracing# echo 1 \u003e tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 \u003e tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436 [000] ..... 1946.208786: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] ..... 1946.279147: ffs_data_clear \u003c-ffs_data_closed\n smartcard-openp-431 [000] .n... 1946.905512: ffs_data_clear \u003c-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G C OE 5.15.0-1-rpi #1 Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [\u003cc08d60a0\u003e] (dump_backtrace) from [\u003cc08d62ec\u003e] (show_stack+0x20/0x24)\n[ 1946.448226] r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [\u003cc08d62cc\u003e] (show_stack) from [\u003cc08d9ae0\u003e] (dump_stack+0x28/0x30)\n[ 1946.470380] [\u003cc08d9ab8\u003e] (dump_stack) from [\u003cc0123500\u003e] (__warn+0xe8/0x154)\n[ 1946.482067] r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [\u003cc0123418\u003e] (__warn) from [\u003cc08d6948\u003e] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758] r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [\u003cc08d68ac\u003e] (warn_slowpath_fmt) from [\u003cc04a948c\u003e] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309] r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [\u003cc04a937c\u003e] (refcount_warn_saturate) from [\u003cc0380134\u003e] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [\u003cc03800ec\u003e] (eventfd_ctx_put) from [\u003cbf5464e8\u003e] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664] r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [\u003cbf546418\u003e] (ffs_data_clear [usb_f_fs]) from [\u003cbf547cc0\u003e] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608] r5:bf54d014 r4:c2695b00\n[ 1946.617522] [\u003cbf547c24\u003e] (ffs_data_closed [usb_f_fs]) from [\u003cbf547da0\u003e] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217] r7:c0dfcb\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46933",
"url": "https://www.suse.com/security/cve/CVE-2021-46933"
},
{
"category": "external",
"summary": "SUSE Bug 1220487 for CVE-2021-46933",
"url": "https://bugzilla.suse.com/1220487"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46955"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix stack OOB read while fragmenting IPv4 packets\n\nrunning openvswitch on kernels built with KASAN, it\u0027s possible to see the\nfollowing splat while testing fragmentation of IPv4 packets:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888112fc713c by task handler2/1367\n\n CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n dump_stack+0x92/0xc1\n print_address_description.constprop.7+0x1a/0x150\n kasan_report.cold.13+0x7f/0x111\n ip_do_fragment+0x1b03/0x1f60\n ovs_fragment+0x5bf/0x840 [openvswitch]\n do_execute_actions+0x1bd5/0x2400 [openvswitch]\n ovs_execute_actions+0xc8/0x3d0 [openvswitch]\n ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]\n genl_family_rcv_msg_doit.isra.15+0x227/0x2d0\n genl_rcv_msg+0x287/0x490\n netlink_rcv_skb+0x120/0x380\n genl_rcv+0x24/0x40\n netlink_unicast+0x439/0x630\n netlink_sendmsg+0x719/0xbf0\n sock_sendmsg+0xe2/0x110\n ____sys_sendmsg+0x5ba/0x890\n ___sys_sendmsg+0xe9/0x160\n __sys_sendmsg+0xd3/0x170\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f957079db07\n Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48\n RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07\n RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019\n RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730\n R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\n R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0\n\n The buggy address belongs to the page:\n page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:\n ovs_fragment+0x0/0x840 [openvswitch]\n\n this frame has 2 objects:\n [32, 144) \u0027ovs_dst\u0027\n [192, 424) \u0027ovs_rt\u0027\n\n Memory state around the buggy address:\n ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00\n \u003effff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00\n ^\n ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00\n\nfor IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n ip_do_fragment()\n ip_skb_dst_mtu()\n ip_dst_mtu_maybe_forward()\n ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin ovs_fragment(), similarly to what is done for IPv6 few lines below.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46955",
"url": "https://www.suse.com/security/cve/CVE-2021-46955"
},
{
"category": "external",
"summary": "SUSE Bug 1220513 for CVE-2021-46955",
"url": "https://bugzilla.suse.com/1220513"
},
{
"category": "external",
"summary": "SUSE Bug 1220537 for CVE-2021-46955",
"url": "https://bugzilla.suse.com/1220537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47074",
"url": "https://www.suse.com/security/cve/CVE-2021-47074"
},
{
"category": "external",
"summary": "SUSE Bug 1220854 for CVE-2021-47074",
"url": "https://bugzilla.suse.com/1220854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: abort in rename_exchange if we fail to insert the second ref\n\nError injection stress uncovered a problem where we\u0027d leave a dangling\ninode ref if we failed during a rename_exchange. This happens because\nwe insert the inode ref for one side of the rename, and then for the\nother side. If this second inode ref insert fails we\u0027ll leave the first\none dangling and leave a corrupt file system behind. Fix this by\naborting if we did the insert for the first inode ref.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47113",
"url": "https://www.suse.com/security/cve/CVE-2021-47113"
},
{
"category": "external",
"summary": "SUSE Bug 1221543 for CVE-2021-47113",
"url": "https://bugzilla.suse.com/1221543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix use-after-free after the TLS device goes down and up\n\nWhen a netdev with active TLS offload goes down, tls_device_down is\ncalled to stop the offload and tear down the TLS context. However, the\nsocket stays alive, and it still points to the TLS context, which is now\ndeallocated. If a netdev goes up, while the connection is still active,\nand the data flow resumes after a number of TCP retransmissions, it will\nlead to a use-after-free of the TLS context.\n\nThis commit addresses this bug by keeping the context alive until its\nnormal destruction, and implements the necessary fallbacks, so that the\nconnection can resume in software (non-offloaded) kTLS mode.\n\nOn the TX side tls_sw_fallback is used to encrypt all packets. The RX\nside already has all the necessary fallbacks, because receiving\nnon-decrypted packets is supported. The thing needed on the RX side is\nto block resync requests, which are normally produced after receiving\nnon-decrypted packets.\n\nThe necessary synchronization is implemented for a graceful teardown:\nfirst the fallbacks are deployed, then the driver resources are released\n(it used to be possible to have a tls_dev_resync after tls_dev_del).\n\nA new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback\nmode. It\u0027s used to skip the RX resync logic completely, as it becomes\nuseless, and some objects may be released (for example, resync_async,\nwhich is allocated and freed by the driver).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47131",
"url": "https://www.suse.com/security/cve/CVE-2021-47131"
},
{
"category": "external",
"summary": "SUSE Bug 1221545 for CVE-2021-47131",
"url": "https://bugzilla.suse.com/1221545"
},
{
"category": "external",
"summary": "SUSE Bug 1222402 for CVE-2021-47131",
"url": "https://bugzilla.suse.com/1222402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt\u0027s not a good idea to append the frag skb to a skb\u0027s frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get\u0027ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n [] kernel BUG at net/core/skbuff.c:1970!\n [] Call Trace:\n [] skb_clone+0x4d/0xb0\n [] macvlan_broadcast+0xd8/0x160 [macvlan]\n [] macvlan_process_broadcast+0x148/0x150 [macvlan]\n [] process_one_work+0x1a7/0x360\n [] worker_thread+0x30/0x390\n\n [] kernel BUG at mm/usercopy.c:102!\n [] Call Trace:\n [] __check_heap_object+0xd3/0x100\n [] __check_object_size+0xff/0x16b\n [] simple_copy_to_iter+0x1c/0x30\n [] __skb_datagram_iter+0x7d/0x310\n [] __skb_datagram_iter+0x2a5/0x310\n [] skb_copy_datagram_iter+0x3b/0x90\n [] tipc_recvmsg+0x14a/0x3a0 [tipc]\n [] ____sys_recvmsg+0x91/0x150\n [] ___sys_recvmsg+0x7b/0xc0\n\n [] kernel BUG at mm/slub.c:305!\n [] Call Trace:\n [] \u003cIRQ\u003e\n [] kmem_cache_free+0x3ff/0x400\n [] __netif_receive_skb_core+0x12c/0xc40\n [] ? kmem_cache_alloc+0x12e/0x270\n [] netif_receive_skb_internal+0x3d/0xb0\n [] ? get_rx_page_info+0x8e/0xa0 [be2net]\n [] be_poll+0x6ef/0xd00 [be2net]\n [] ? irq_exit+0x4f/0x100\n [] net_rx_action+0x149/0x3b0\n\n ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47162",
"url": "https://www.suse.com/security/cve/CVE-2021-47162"
},
{
"category": "external",
"summary": "SUSE Bug 1221977 for CVE-2021-47162",
"url": "https://bugzilla.suse.com/1221977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n [\u003cffffffff84245b62\u003e] kmalloc include/linux/slab.h:556 [inline]\n [\u003cffffffff84245b62\u003e] kzalloc include/linux/slab.h:686 [inline]\n [\u003cffffffff84245b62\u003e] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n [\u003cffffffff82b5b2e6\u003e] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47171",
"url": "https://www.suse.com/security/cve/CVE-2021-47171"
},
{
"category": "external",
"summary": "SUSE Bug 1221994 for CVE-2021-47171",
"url": "https://bugzilla.suse.com/1221994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp-\u003ecmd);\n\nFix this warning by clearing lrbp-\u003ecmd from the abort handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47188",
"url": "https://www.suse.com/security/cve/CVE-2021-47188"
},
{
"category": "external",
"summary": "SUSE Bug 1222671 for CVE-2021-47188",
"url": "https://bugzilla.suse.com/1222671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47206",
"url": "https://www.suse.com/security/cve/CVE-2021-47206"
},
{
"category": "external",
"summary": "SUSE Bug 1222894 for CVE-2021-47206",
"url": "https://bugzilla.suse.com/1222894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47220"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47220",
"url": "https://www.suse.com/security/cve/CVE-2021-47220"
},
{
"category": "external",
"summary": "SUSE Bug 1224859 for CVE-2021-47220",
"url": "https://bugzilla.suse.com/1224859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: aardvark: Fix kernel panic during PIO transfer\n\nTrying to start a new PIO transfer by writing value 0 in PIO_START register\nwhen previous transfer has not yet completed (which is indicated by value 1\nin PIO_START) causes an External Abort on CPU, which results in kernel\npanic:\n\n SError Interrupt on CPU0, code 0xbf000002 -- SError\n Kernel panic - not syncing: Asynchronous SError Interrupt\n\nTo prevent kernel panic, it is required to reject a new PIO transfer when\nprevious one has not finished yet.\n\nIf previous PIO transfer is not finished yet, the kernel may issue a new\nPIO request only if the previous PIO transfer timed out.\n\nIn the past the root cause of this issue was incorrectly identified (as it\noften happens during link retraining or after link down event) and special\nhack was implemented in Trusted Firmware to catch all SError events in EL3,\nto ignore errors with code 0xbf000002 and not forwarding any other errors\nto kernel and instead throw panic from EL3 Trusted Firmware handler.\n\nLinks to discussion and patches about this issue:\nhttps://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50\nhttps://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/\nhttps://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/\nhttps://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541\n\nBut the real cause was the fact that during link retraining or after link\ndown event the PIO transfer may take longer time, up to the 1.44s until it\ntimes out. This increased probability that a new PIO transfer would be\nissued by kernel while previous one has not finished yet.\n\nAfter applying this change into the kernel, it is possible to revert the\nmentioned TF-A hack and SError events do not have to be caught in TF-A EL3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47229",
"url": "https://www.suse.com/security/cve/CVE-2021-47229"
},
{
"category": "external",
"summary": "SUSE Bug 1224854 for CVE-2021-47229",
"url": "https://bugzilla.suse.com/1224854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: fix memory leak in mcba_usb\n\nSyzbot reported memory leak in SocketCAN driver for Microchip CAN BUS\nAnalyzer Tool. The problem was in unfreed usb_coherent.\n\nIn mcba_usb_start() 20 coherent buffers are allocated and there is\nnothing, that frees them:\n\n1) In callback function the urb is resubmitted and that\u0027s all\n2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER\n is not set (see mcba_usb_start) and this flag cannot be used with\n coherent buffers.\n\nFail log:\n| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected\n| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)\n\nSo, all allocated buffers should be freed with usb_free_coherent()\nexplicitly\n\nNOTE:\nThe same pattern for allocating and freeing coherent buffers\nis used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47231",
"url": "https://www.suse.com/security/cve/CVE-2021-47231"
},
{
"category": "external",
"summary": "SUSE Bug 1224849 for CVE-2021-47231",
"url": "https://bugzilla.suse.com/1224849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: fix potential use-after-free in ec_bhf_remove\n\nstatic void ec_bhf_remove(struct pci_dev *dev)\n{\n...\n\tstruct ec_bhf_priv *priv = netdev_priv(net_dev);\n\n\tunregister_netdev(net_dev);\n\tfree_netdev(net_dev);\n\n\tpci_iounmap(dev, priv-\u003edma_io);\n\tpci_iounmap(dev, priv-\u003eio);\n...\n}\n\npriv is netdev private data, but it is used\nafter free_netdev(). It can cause use-after-free when accessing priv\npointer. So, fix it by moving free_netdev() after pci_iounmap()\ncalls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47235",
"url": "https://www.suse.com/security/cve/CVE-2021-47235"
},
{
"category": "external",
"summary": "SUSE Bug 1224844 for CVE-2021-47235",
"url": "https://bugzilla.suse.com/1224844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2021-47236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47236",
"url": "https://www.suse.com/security/cve/CVE-2021-47236"
},
{
"category": "external",
"summary": "SUSE Bug 1224841 for CVE-2021-47236",
"url": "https://bugzilla.suse.com/1224841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47236"
},
{
"cve": "CVE-2021-47237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47237"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hamradio: fix memory leak in mkiss_close\n\nMy local syzbot instance hit memory leak in\nmkiss_open()[1]. The problem was in missing\nfree_netdev() in mkiss_close().\n\nIn mkiss_open() netdevice is allocated and then\nregistered, but in mkiss_close() netdevice was\nonly unregistered, but not freed.\n\nFail log:\n\nBUG: memory leak\nunreferenced object 0xffff8880281ba000 (size 4096):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00 ax0.............\n 00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00 .\u0027.*............\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706e7e8\u003e] alloc_netdev_mqs+0x98/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880141a9a00 (size 96):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff ...(.......(....\n 98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00 .....@..........\n backtrace:\n [\u003cffffffff8709f68b\u003e] __hw_addr_create_ex+0x5b/0x310\n [\u003cffffffff8709fb38\u003e] __hw_addr_add_ex+0x1f8/0x2b0\n [\u003cffffffff870a0c7b\u003e] dev_addr_init+0x10b/0x1f0\n [\u003cffffffff8706e88b\u003e] alloc_netdev_mqs+0x13b/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff8880219bfc00 (size 512):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff ...(............\n 80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706eec7\u003e] alloc_netdev_mqs+0x777/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nBUG: memory leak\nunreferenced object 0xffff888029b2b200 (size 256):\n comm \"syz-executor.1\", pid 11443, jiffies 4295046091 (age 17.660s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003cffffffff81a27201\u003e] kvmalloc_node+0x61/0xf0\n [\u003cffffffff8706f062\u003e] alloc_netdev_mqs+0x912/0xe80\n [\u003cffffffff84e64192\u003e] mkiss_open+0xb2/0x6f0 [1]\n [\u003cffffffff842355db\u003e] tty_ldisc_open+0x9b/0x110\n [\u003cffffffff84236488\u003e] tty_set_ldisc+0x2e8/0x670\n [\u003cffffffff8421f7f3\u003e] tty_ioctl+0xda3/0x1440\n [\u003cffffffff81c9f273\u003e] __x64_sys_ioctl+0x193/0x200\n [\u003cffffffff8911263a\u003e] do_syscall_64+0x3a/0xb0\n [\u003cffffffff89200068\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47237",
"url": "https://www.suse.com/security/cve/CVE-2021-47237"
},
{
"category": "external",
"summary": "SUSE Bug 1224830 for CVE-2021-47237",
"url": "https://bugzilla.suse.com/1224830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47237"
},
{
"cve": "CVE-2021-47238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in ip_mc_add1_src\n\nBUG: memory leak\nunreferenced object 0xffff888101bc4c00 (size 32):\n comm \"syz-executor527\", pid 360, jiffies 4294807421 (age 19.329s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................\n backtrace:\n [\u003c00000000f17c5244\u003e] kmalloc include/linux/slab.h:558 [inline]\n [\u003c00000000f17c5244\u003e] kzalloc include/linux/slab.h:688 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]\n [\u003c00000000f17c5244\u003e] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095\n [\u003c000000001cb99709\u003e] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416\n [\u003c0000000052cf19ed\u003e] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]\n [\u003c0000000052cf19ed\u003e] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423\n [\u003c00000000477edfbc\u003e] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857\n [\u003c00000000e75ca9bb\u003e] __sys_setsockopt+0x158/0x270 net/socket.c:2117\n [\u003c00000000bdb993a8\u003e] __do_sys_setsockopt net/socket.c:2128 [inline]\n [\u003c00000000bdb993a8\u003e] __se_sys_setsockopt net/socket.c:2125 [inline]\n [\u003c00000000bdb993a8\u003e] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125\n [\u003c000000006a1ffdbd\u003e] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47\n [\u003c00000000b11467c4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn commit 24803f38a5c0 (\"igmp: do not remove igmp souce list info when set\nlink down\"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,\nbecause it was also called in igmpv3_clear_delrec().\n\nRough callgraph:\n\ninetdev_destroy\n-\u003e ip_mc_destroy_dev\n -\u003e igmpv3_clear_delrec\n -\u003e ip_mc_clear_src\n-\u003e RCU_INIT_POINTER(dev-\u003eip_ptr, NULL)\n\nHowever, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn\u0027t\nrelease in_dev-\u003emc_list-\u003esources. And RCU_INIT_POINTER() assigns the\nNULL to dev-\u003eip_ptr. As a result, in_dev cannot be obtained through\ninetdev_by_index() and then in_dev-\u003emc_list-\u003esources cannot be released\nby ip_mc_del1_src() in the sock_close. Rough call sequence goes like:\n\nsock_close\n-\u003e __sock_release\n -\u003e inet_release\n -\u003e ip_mc_drop_socket\n -\u003e inetdev_by_index\n -\u003e ip_mc_leave_src\n -\u003e ip_mc_del_src\n -\u003e ip_mc_del1_src\n\nSo we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free\nin_dev-\u003emc_list-\u003esources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47238",
"url": "https://www.suse.com/security/cve/CVE-2021-47238"
},
{
"category": "external",
"summary": "SUSE Bug 1224847 for CVE-2021-47238",
"url": "https://bugzilla.suse.com/1224847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47238"
},
{
"cve": "CVE-2021-47239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix possible use-after-free in smsc75xx_bind\n\nThe commit 46a8b29c6306 (\"net: usb: fix memory leak in smsc75xx_bind\")\nfails to clean up the work scheduled in smsc75xx_reset-\u003e\nsmsc75xx_set_multicast, which leads to use-after-free if the work is\nscheduled to start after the deallocation. In addition, this patch\nalso removes a dangling pointer - dev-\u003edata[0].\n\nThis patch calls cancel_work_sync to cancel the scheduled work and set\nthe dangling pointer to NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47239",
"url": "https://www.suse.com/security/cve/CVE-2021-47239"
},
{
"category": "external",
"summary": "SUSE Bug 1224846 for CVE-2021-47239",
"url": "https://bugzilla.suse.com/1224846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47239"
},
{
"cve": "CVE-2021-47245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47245"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: synproxy: Fix out of bounds when parsing TCP options\n\nThe TCP option parser in synproxy (synproxy_parse_options) could read\none byte out of bounds. When the length is 1, the execution flow gets\ninto the loop, reads one byte of the opcode, and if the opcode is\nneither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds\nthe length of 1.\n\nThis fix is inspired by commit 9609dad263f8 (\"ipv4: tcp_input: fix stack\nout of bounds when parsing TCP options.\").\n\nv2 changes:\n\nAdded an early return when length \u003c 0 to avoid calling\nskb_header_pointer with negative length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47245",
"url": "https://www.suse.com/security/cve/CVE-2021-47245"
},
{
"category": "external",
"summary": "SUSE Bug 1224838 for CVE-2021-47245",
"url": "https://bugzilla.suse.com/1224838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47245"
},
{
"cve": "CVE-2021-47246",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47246"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix page reclaim for dead peer hairpin\n\nWhen adding a hairpin flow, a firmware-side send queue is created for\nthe peer net device, which claims some host memory pages for its\ninternal ring buffer. If the peer net device is removed/unbound before\nthe hairpin flow is deleted, then the send queue is not destroyed which\nleads to a stack trace on pci device remove:\n\n[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource\n[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110\n[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0\n[ 748.002171] ------------[ cut here ]------------\n[ 748.001177] FW pages counter is 4 after reclaiming all pages\n[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core] [ +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]\n[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1\n[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]\n[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 \u003c0f\u003e 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9\n[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286\n[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000\n[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51\n[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8\n[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30\n[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000\n[ 748.001429] FS: 00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000\n[ 748.001695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0\n[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 748.001654] Call Trace:\n[ 748.000576] ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]\n[ 748.001416] ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]\n[ 748.001354] ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]\n[ 748.001203] mlx5_function_teardown+0x30/0x60 [mlx5_core]\n[ 748.001275] mlx5_uninit_one+0xa7/0xc0 [mlx5_core]\n[ 748.001200] remove_one+0x5f/0xc0 [mlx5_core]\n[ 748.001075] pci_device_remove+0x9f/0x1d0\n[ 748.000833] device_release_driver_internal+0x1e0/0x490\n[ 748.001207] unbind_store+0x19f/0x200\n[ 748.000942] ? sysfs_file_ops+0x170/0x170\n[ 748.001000] kernfs_fop_write_iter+0x2bc/0x450\n[ 748.000970] new_sync_write+0x373/0x610\n[ 748.001124] ? new_sync_read+0x600/0x600\n[ 748.001057] ? lock_acquire+0x4d6/0x700\n[ 748.000908] ? lockdep_hardirqs_on_prepare+0x400/0x400\n[ 748.001126] ? fd_install+0x1c9/0x4d0\n[ 748.000951] vfs_write+0x4d0/0x800\n[ 748.000804] ksys_write+0xf9/0x1d0\n[ 748.000868] ? __x64_sys_read+0xb0/0xb0\n[ 748.000811] ? filp_open+0x50/0x50\n[ 748.000919] ? syscall_enter_from_user_mode+0x1d/0x50\n[ 748.001223] do_syscall_64+0x3f/0x80\n[ 748.000892] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 748.00\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47246",
"url": "https://www.suse.com/security/cve/CVE-2021-47246"
},
{
"category": "external",
"summary": "SUSE Bug 1224831 for CVE-2021-47246",
"url": "https://bugzilla.suse.com/1224831"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47246"
},
{
"cve": "CVE-2021-47248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47248"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: fix race between close() and udp_abort()\n\nKaustubh reported and diagnosed a panic in udp_lib_lookup().\nThe root cause is udp_abort() racing with close(). Both\nracing functions acquire the socket lock, but udp{v6}_destroy_sock()\nrelease it before performing destructive actions.\n\nWe can\u0027t easily extend the socket lock scope to avoid the race,\ninstead use the SOCK_DEAD flag to prevent udp_abort from doing\nany action when the critical race happens.\n\nDiagnosed-and-tested-by: Kaustubh Pandey \u003ckapandey@codeaurora.org\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47248",
"url": "https://www.suse.com/security/cve/CVE-2021-47248"
},
{
"category": "external",
"summary": "SUSE Bug 1224867 for CVE-2021-47248",
"url": "https://bugzilla.suse.com/1224867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47248"
},
{
"cve": "CVE-2021-47249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47249"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: fix memory leak in rds_recvmsg\n\nSyzbot reported memory leak in rds. The problem\nwas in unputted refcount in case of error.\n\nint rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,\n\t\tint msg_flags)\n{\n...\n\n\tif (!rds_next_incoming(rs, \u0026inc)) {\n\t\t...\n\t}\n\nAfter this \"if\" inc refcount incremented and\n\n\tif (rds_cmsg_recv(inc, msg, rs)) {\n\t\tret = -EFAULT;\n\t\tgoto out;\n\t}\n...\nout:\n\treturn ret;\n}\n\nin case of rds_cmsg_recv() fail the refcount won\u0027t be\ndecremented. And it\u0027s easy to see from ftrace log, that\nrds_inc_addref() don\u0027t have rds_inc_put() pair in\nrds_recvmsg() after rds_cmsg_recv()\n\n 1) | rds_recvmsg() {\n 1) 3.721 us | rds_inc_addref();\n 1) 3.853 us | rds_message_inc_copy_to_user();\n 1) + 10.395 us | rds_cmsg_recv();\n 1) + 34.260 us | }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47249",
"url": "https://www.suse.com/security/cve/CVE-2021-47249"
},
{
"category": "external",
"summary": "SUSE Bug 1224880 for CVE-2021-47249",
"url": "https://bugzilla.suse.com/1224880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47249"
},
{
"cve": "CVE-2021-47250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47250"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv4: fix memory leak in netlbl_cipsov4_add_std\n\nReported by syzkaller:\nBUG: memory leak\nunreferenced object 0xffff888105df7000 (size 64):\ncomm \"syz-executor842\", pid 360, jiffies 4294824824 (age 22.546s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[\u003c00000000e67ed558\u003e] kmalloc include/linux/slab.h:590 [inline]\n[\u003c00000000e67ed558\u003e] kzalloc include/linux/slab.h:720 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]\n[\u003c00000000e67ed558\u003e] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416\n[\u003c0000000006040154\u003e] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739\n[\u003c00000000204d7a1c\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n[\u003c00000000204d7a1c\u003e] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800\n[\u003c00000000c0d6a995\u003e] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504\n[\u003c00000000d78b9d2c\u003e] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811\n[\u003c000000009733081b\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n[\u003c000000009733081b\u003e] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340\n[\u003c00000000d5fd43b8\u003e] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929\n[\u003c000000000a2d1e40\u003e] sock_sendmsg_nosec net/socket.c:654 [inline]\n[\u003c000000000a2d1e40\u003e] sock_sendmsg+0x139/0x170 net/socket.c:674\n[\u003c00000000321d1969\u003e] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350\n[\u003c00000000964e16bc\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404\n[\u003c000000001615e288\u003e] __sys_sendmsg+0xd3/0x190 net/socket.c:2433\n[\u003c000000004ee8b6a5\u003e] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47\n[\u003c00000000171c7cee\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe memory of doi_def-\u003emap.std pointing is allocated in\nnetlbl_cipsov4_add_std, but no place has freed it. It should be\nfreed in cipso_v4_doi_free which frees the cipso DOI resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47250",
"url": "https://www.suse.com/security/cve/CVE-2021-47250"
},
{
"category": "external",
"summary": "SUSE Bug 1224827 for CVE-2021-47250",
"url": "https://bugzilla.suse.com/1224827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47250"
},
{
"cve": "CVE-2021-47252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid WARN_ON timing related checks\n\nThe soft/batadv interface for a queued OGM can be changed during the time\nthe OGM was queued for transmission and when the OGM is actually\ntransmitted by the worker.\n\nBut WARN_ON must be used to denote kernel bugs and not to print simple\nwarnings. A warning can simply be printed using pr_warn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47252",
"url": "https://www.suse.com/security/cve/CVE-2021-47252"
},
{
"category": "external",
"summary": "SUSE Bug 1224882 for CVE-2021-47252",
"url": "https://bugzilla.suse.com/1224882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47252"
},
{
"cve": "CVE-2021-47254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47254"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix use-after-free in gfs2_glock_shrink_scan\n\nThe GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to\nremove the glock from the lru list in __gfs2_glock_put().\n\nOn the shrink scan path, the same flag is cleared under lru_lock but because\nof cond_resched_lock(\u0026lru_lock) in gfs2_dispose_glock_lru(), progress on the\nput side can be made without deleting the glock from the lru list.\n\nKeep GLF_LRU across the race window opened by cond_resched_lock(\u0026lru_lock) to\nensure correct behavior on both sides - clear GLF_LRU after list_del under\nlru_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47254",
"url": "https://www.suse.com/security/cve/CVE-2021-47254"
},
{
"category": "external",
"summary": "SUSE Bug 1224888 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1224888"
},
{
"category": "external",
"summary": "SUSE Bug 1227559 for CVE-2021-47254",
"url": "https://bugzilla.suse.com/1227559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47254"
},
{
"cve": "CVE-2021-47258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47258"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix error handling of scsi_host_alloc()\n\nAfter device is initialized via device_initialize(), or its name is set via\ndev_set_name(), the device has to be freed via put_device(). Otherwise\ndevice name will be leaked because it is allocated dynamically in\ndev_set_name().\n\nFix the leak by replacing kfree() with put_device(). Since\nscsi_host_dev_release() properly handles IDA and kthread removal, remove\nspecial-casing these from the error handling as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47258",
"url": "https://www.suse.com/security/cve/CVE-2021-47258"
},
{
"category": "external",
"summary": "SUSE Bug 1224899 for CVE-2021-47258",
"url": "https://bugzilla.suse.com/1224899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47258"
},
{
"cve": "CVE-2021-47260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47260"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a potential NULL dereference in nfs_get_client()\n\nNone of the callers are expecting NULL returns from nfs_get_client() so\nthis code will lead to an Oops. It\u0027s better to return an error\npointer. I expect that this is dead code so hopefully no one is\naffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47260",
"url": "https://www.suse.com/security/cve/CVE-2021-47260"
},
{
"category": "external",
"summary": "SUSE Bug 1224834 for CVE-2021-47260",
"url": "https://bugzilla.suse.com/1224834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47260"
},
{
"cve": "CVE-2021-47261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47261"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix initializing CQ fragments buffer\n\nThe function init_cq_frag_buf() can be called to initialize the current CQ\nfragments buffer cq-\u003ebuf, or the temporary cq-\u003eresize_buf that is filled\nduring CQ resize operation.\n\nHowever, the offending commit started to use function get_cqe() for\ngetting the CQEs, the issue with this change is that get_cqe() always\nreturns CQEs from cq-\u003ebuf, which leads us to initialize the wrong buffer,\nand in case of enlarging the CQ we try to access elements beyond the size\nof the current cq-\u003ebuf and eventually hit a kernel panic.\n\n [exception RIP: init_cq_frag_buf+103]\n [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]\n [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]\n [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]\n [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]\n [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]\n [ffff9f799ddcbec8] kthread at ffffffffa66c5da1\n [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd\n\nFix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that\ntakes the correct source buffer as a parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47261",
"url": "https://www.suse.com/security/cve/CVE-2021-47261"
},
{
"category": "external",
"summary": "SUSE Bug 1224954 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1224954"
},
{
"category": "external",
"summary": "SUSE Bug 1227751 for CVE-2021-47261",
"url": "https://bugzilla.suse.com/1227751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47261"
},
{
"cve": "CVE-2021-47265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47265"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA: Verify port when creating flow rule\n\nValidate port value provided by the user and with that remove no longer\nneeded validation by the driver. The missing check in the mlx5_ib driver\ncould cause to the below oops.\n\nCall trace:\n _create_flow_rule+0x2d4/0xf28 [mlx5_ib]\n mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]\n ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]\n ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]\n ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]\n ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]\n do_vfs_ioctl+0xd0/0xaf0\n ksys_ioctl+0x84/0xb4\n __arm64_sys_ioctl+0x28/0xc4\n el0_svc_common.constprop.3+0xa4/0x254\n el0_svc_handler+0x84/0xa0\n el0_svc+0x10/0x26c\n Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47265",
"url": "https://www.suse.com/security/cve/CVE-2021-47265"
},
{
"category": "external",
"summary": "SUSE Bug 1224957 for CVE-2021-47265",
"url": "https://bugzilla.suse.com/1224957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47265"
},
{
"cve": "CVE-2021-47269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: ep0: fix NULL pointer exception\n\nThere is no validation of the index from dwc3_wIndex_to_dep() and we might\nbe referring a non-existing ep and trigger a NULL pointer exception. In\ncertain configurations we might use fewer eps and the index might wrongly\nindicate a larger ep index than existing.\n\nBy adding this validation from the patch we can actually report a wrong\nindex back to the caller.\n\nIn our usecase we are using a composite device on an older kernel, but\nupstream might use this fix also. Unfortunately, I cannot describe the\nhardware for others to reproduce the issue as it is a proprietary\nimplementation.\n\n[ 82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4\n[ 82.966891] Mem abort info:\n[ 82.969663] ESR = 0x96000006\n[ 82.972703] Exception class = DABT (current EL), IL = 32 bits\n[ 82.978603] SET = 0, FnV = 0\n[ 82.981642] EA = 0, S1PTW = 0\n[ 82.984765] Data abort info:\n[ 82.987631] ISV = 0, ISS = 0x00000006\n[ 82.991449] CM = 0, WnR = 0\n[ 82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc\n[ 83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000\n[ 83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP\n[ 83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)\n[ 83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1\n[ 83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)\n[ 83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94\n\n...\n\n[ 83.141788] Call trace:\n[ 83.144227] dwc3_ep0_handle_feature+0x414/0x43c\n[ 83.148823] dwc3_ep0_interrupt+0x3b4/0xc94\n[ 83.181546] ---[ end trace aac6b5267d84c32f ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47269",
"url": "https://www.suse.com/security/cve/CVE-2021-47269"
},
{
"category": "external",
"summary": "SUSE Bug 1224996 for CVE-2021-47269",
"url": "https://bugzilla.suse.com/1224996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47269"
},
{
"cve": "CVE-2021-47274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Correct the length check which causes memory corruption\n\nWe\u0027ve suffered from severe kernel crashes due to memory corruption on\nour production environment, like,\n\nCall Trace:\n[1640542.554277] general protection fault: 0000 [#1] SMP PTI\n[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G\n[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190\n[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286\n[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:\n0000000006e931bf\n[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:\nffff9a45ff004300\n[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:\n0000000000000000\n[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:\nffffffff9a20608d\n[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:\n696c662f65636976\n[1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)\nknlGS:0000000000000000\n[1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:\n00000000003606e0\n[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1640542.566742] Call Trace:\n[1640542.567009] anon_vma_clone+0x5d/0x170\n[1640542.567417] __split_vma+0x91/0x1a0\n[1640542.567777] do_munmap+0x2c6/0x320\n[1640542.568128] vm_munmap+0x54/0x70\n[1640542.569990] __x64_sys_munmap+0x22/0x30\n[1640542.572005] do_syscall_64+0x5b/0x1b0\n[1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[1640542.575642] RIP: 0033:0x7f45d6e61e27\n\nJames Wang has reproduced it stably on the latest 4.19 LTS.\nAfter some debugging, we finally proved that it\u0027s due to ftrace\nbuffer out-of-bound access using a debug tool as follows:\n[ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000\n[ 86.780806] no_context+0xdf/0x3c0\n[ 86.784327] __do_page_fault+0x252/0x470\n[ 86.788367] do_page_fault+0x32/0x140\n[ 86.792145] page_fault+0x1e/0x30\n[ 86.795576] strncpy_from_unsafe+0x66/0xb0\n[ 86.799789] fetch_memory_string+0x25/0x40\n[ 86.804002] fetch_deref_string+0x51/0x60\n[ 86.808134] kprobe_trace_func+0x32d/0x3a0\n[ 86.812347] kprobe_dispatcher+0x45/0x50\n[ 86.816385] kprobe_ftrace_handler+0x90/0xf0\n[ 86.820779] ftrace_ops_assist_func+0xa1/0x140\n[ 86.825340] 0xffffffffc00750bf\n[ 86.828603] do_sys_open+0x5/0x1f0\n[ 86.832124] do_syscall_64+0x5b/0x1b0\n[ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\ncommit b220c049d519 (\"tracing: Check length before giving out\nthe filter buffer\") adds length check to protect trace data\noverflow introduced in 0fc1b09ff1ff, seems that this fix can\u0027t prevent\noverflow entirely, the length check should also take the sizeof\nentry-\u003earray[0] into account, since this array[0] is filled the\nlength of trace data and occupy addtional space and risk overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47274",
"url": "https://www.suse.com/security/cve/CVE-2021-47274"
},
{
"category": "external",
"summary": "SUSE Bug 1224990 for CVE-2021-47274",
"url": "https://bugzilla.suse.com/1224990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47274"
},
{
"cve": "CVE-2021-47276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47276"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Do not blindly read the ip address in ftrace_bug()\n\nIt was reported that a bug on arm64 caused a bad ip address to be used for\nupdating into a nop in ftrace_init(), but the error path (rightfully)\nreturned -EINVAL and not -EFAULT, as the bug caused more than one error to\noccur. But because -EINVAL was returned, the ftrace_bug() tried to report\nwhat was at the location of the ip address, and read it directly. This\ncaused the machine to panic, as the ip was not pointing to a valid memory\naddress.\n\nInstead, read the ip address with copy_from_kernel_nofault() to safely\naccess the memory, and if it faults, report that the address faulted,\notherwise report what was in that location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47276",
"url": "https://www.suse.com/security/cve/CVE-2021-47276"
},
{
"category": "external",
"summary": "SUSE Bug 1224966 for CVE-2021-47276",
"url": "https://bugzilla.suse.com/1224966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47276"
},
{
"cve": "CVE-2021-47277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkvm: avoid speculation-based attacks from out-of-range memslot accesses\n\nKVM\u0027s mechanism for accessing guest memory translates a guest physical\naddress (gpa) to a host virtual address using the right-shifted gpa\n(also known as gfn) and a struct kvm_memory_slot. The translation is\nperformed in __gfn_to_hva_memslot using the following formula:\n\n hva = slot-\u003euserspace_addr + (gfn - slot-\u003ebase_gfn) * PAGE_SIZE\n\nIt is expected that gfn falls within the boundaries of the guest\u0027s\nphysical memory. However, a guest can access invalid physical addresses\nin such a way that the gfn is invalid.\n\n__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first\nretrieves a memslot through __gfn_to_memslot. While __gfn_to_memslot\ndoes check that the gfn falls within the boundaries of the guest\u0027s\nphysical memory or not, a CPU can speculate the result of the check and\ncontinue execution speculatively using an illegal gfn. The speculation\ncan result in calculating an out-of-bounds hva. If the resulting host\nvirtual address is used to load another guest physical address, this\nis effectively a Spectre gadget consisting of two consecutive reads,\nthe second of which is data dependent on the first.\n\nRight now it\u0027s not clear if there are any cases in which this is\nexploitable. One interesting case was reported by the original author\nof this patch, and involves visiting guest page tables on x86. Right\nnow these are not vulnerable because the hva read goes through get_user(),\nwhich contains an LFENCE speculation barrier. However, there are\npatches in progress for x86 uaccess.h to mask kernel addresses instead of\nusing LFENCE; once these land, a guest could use speculation to read\nfrom the VMM\u0027s ring 3 address space. Other architectures such as ARM\nalready use the address masking method, and would be susceptible to\nthis same kind of data-dependent access gadgets. Therefore, this patch\nproactively protects from these attacks by masking out-of-bounds gfns\nin __gfn_to_hva_memslot, which blocks speculation of invalid hvas.\n\nSean Christopherson noted that this patch does not cover\nkvm_read_guest_offset_cached. This however is limited to a few bytes\npast the end of the cache, and therefore it is unlikely to be useful in\nthe context of building a chain of data dependent accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47277",
"url": "https://www.suse.com/security/cve/CVE-2021-47277"
},
{
"category": "external",
"summary": "SUSE Bug 1224960 for CVE-2021-47277",
"url": "https://bugzilla.suse.com/1224960"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47277"
},
{
"cve": "CVE-2021-47280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47280"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free read in drm_getunique()\n\nThere is a time-of-check-to-time-of-use error in drm_getunique() due\nto retrieving file_priv-\u003emaster prior to locking the device\u0027s master\nmutex.\n\nAn example can be seen in the crash report of the use-after-free error\nfound by Syzbot:\nhttps://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803\n\nIn the report, the master pointer was used after being freed. This is\nbecause another process had acquired the device\u0027s master mutex in\ndrm_setmaster_ioctl(), then overwrote fpriv-\u003emaster in\ndrm_new_set_master(). The old value of fpriv-\u003emaster was subsequently\nfreed before the mutex was unlocked.\n\nTo fix this, we lock the device\u0027s master mutex before retrieving the\npointer from from fpriv-\u003emaster. This patch passes the Syzbot\nreproducer test.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47280",
"url": "https://www.suse.com/security/cve/CVE-2021-47280"
},
{
"category": "external",
"summary": "SUSE Bug 1224982 for CVE-2021-47280",
"url": "https://bugzilla.suse.com/1224982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47280"
},
{
"cve": "CVE-2021-47281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: Fix race of snd_seq_timer_open()\n\nThe timer instance per queue is exclusive, and snd_seq_timer_open()\nshould have managed the concurrent accesses. It looks as if it\u0027s\nchecking the already existing timer instance at the beginning, but\nit\u0027s not right, because there is no protection, hence any later\nconcurrent call of snd_seq_timer_open() may override the timer\ninstance easily. This may result in UAF, as the leftover timer\ninstance can keep running while the queue itself gets closed, as\nspotted by syzkaller recently.\n\nFor avoiding the race, add a proper check at the assignment of\ntmr-\u003etimeri again, and return -EBUSY if it\u0027s been already registered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47281",
"url": "https://www.suse.com/security/cve/CVE-2021-47281"
},
{
"category": "external",
"summary": "SUSE Bug 1224983 for CVE-2021-47281",
"url": "https://bugzilla.suse.com/1224983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47281"
},
{
"cve": "CVE-2021-47284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n\u0027nj_setup\u0027 in netjet.c might fail with -EIO and in this case\n\u0027card-\u003eirq\u0027 is initialized and is bigger than zero. A subsequent call to\n\u0027nj_release\u0027 will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to \u0027card-\u003eirq\u0027 and just\nkeep the assignment before \u0027request_irq\u0027.\n\nThe KASAN\u0027s log reveals it:\n\n[ 3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[ 3.355112 ] Modules linked in:\n[ 3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[ 3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff \u003c0f\u003e 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[ 3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[ 3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[ 3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[ 3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[ 3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[ 3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[ 3.360652 ] FS: 0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[ 3.361170 ] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[ 3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[ 3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] nj_release+0x51/0x1e0\n[ 3.362175 ] nj_probe+0x450/0x950\n[ 3.362175 ] ? pci_device_remove+0x110/0x110\n[ 3.362175 ] local_pci_probe+0x45/0xa0\n[ 3.362175 ] pci_device_probe+0x12b/0x1d0\n[ 3.362175 ] really_probe+0x2a9/0x610\n[ 3.362175 ] driver_probe_device+0x90/0x1d0\n[ 3.362175 ] ? mutex_lock_nested+0x1b/0x20\n[ 3.362175 ] device_driver_attach+0x68/0x70\n[ 3.362175 ] __driver_attach+0x124/0x1b0\n[ 3.362175 ] ? device_driver_attach+0x70/0x70\n[ 3.362175 ] bus_for_each_dev+0xbb/0x110\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] driver_attach+0x27/0x30\n[ 3.362175 ] bus_add_driver+0x1eb/0x2a0\n[ 3.362175 ] driver_register+0xa9/0x180\n[ 3.362175 ] __pci_register_driver+0x82/0x90\n[ 3.362175 ] ? w6692_init+0x38/0x38\n[ 3.362175 ] nj_init+0x36/0x38\n[ 3.362175 ] do_one_initcall+0x7f/0x3d0\n[ 3.362175 ] ? rdinit_setup+0x45/0x45\n[ 3.362175 ] ? rcu_read_lock_sched_held+0x4f/0x80\n[ 3.362175 ] kernel_init_freeable+0x2aa/0x301\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] kernel_init+0x18/0x190\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ? rest_init+0x2c0/0x2c0\n[ 3.362175 ] ret_from_fork+0x1f/0x30\n[ 3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[ 3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[ 3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 3.362175 ] Call Trace:\n[ 3.362175 ] dump_stack+0xba/0xf5\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] panic+0x15a/0x3f2\n[ 3.362175 ] ? __warn+0xf2/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] __warn+0x108/0x150\n[ 3.362175 ] ? free_irq+0x100/0x480\n[ 3.362175 ] report_bug+0x119/0x1c0\n[ 3.362175 ] handle_bug+0x3b/0x80\n[ 3.362175 ] exc_invalid_op+0x18/0x70\n[ 3.362175 ] asm_exc_invalid_op+0x12/0x20\n[ 3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47284",
"url": "https://www.suse.com/security/cve/CVE-2021-47284"
},
{
"category": "external",
"summary": "SUSE Bug 1224987 for CVE-2021-47284",
"url": "https://bugzilla.suse.com/1224987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47285"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47285",
"url": "https://www.suse.com/security/cve/CVE-2021-47285"
},
{
"category": "external",
"summary": "SUSE Bug 1224981 for CVE-2021-47285",
"url": "https://bugzilla.suse.com/1224981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47285"
},
{
"cve": "CVE-2021-47288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47288"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()\n\nFix an 11-year old bug in ngene_command_config_free_buf() while\naddressing the following warnings caught with -Warray-bounds:\n\narch/alpha/include/asm/string.h:22:16: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\narch/x86/include/asm/string_32.h:182:25: warning: \u0027__builtin_memcpy\u0027 offset [12, 16] from the object at \u0027com\u0027 is out of the bounds of referenced subobject \u0027config\u0027 with type \u0027unsigned char\u0027 at offset 10 [-Warray-bounds]\n\nThe problem is that the original code is trying to copy 6 bytes of\ndata into a one-byte size member _config_ of the wrong structue\nFW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a\nlegitimate compiler warning because memcpy() overruns the length\nof \u0026com.cmd.ConfigureBuffers.config. It seems that the right\nstructure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains\n6 more members apart from the header _hdr_. Also, the name of\nthe function ngene_command_config_free_buf() suggests that the actual\nintention is to ConfigureFreeBuffers, instead of ConfigureBuffers\n(which takes place in the function ngene_command_config_buf(), above).\n\nFix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS\ninto new struct config, and use \u0026com.cmd.ConfigureFreeBuffers.config as\nthe destination address, instead of \u0026com.cmd.ConfigureBuffers.config,\nwhen calling memcpy().\n\nThis also helps with the ongoing efforts to globally enable\n-Warray-bounds and get us closer to being able to tighten the\nFORTIFY_SOURCE routines on memcpy().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47288",
"url": "https://www.suse.com/security/cve/CVE-2021-47288"
},
{
"category": "external",
"summary": "SUSE Bug 1224889 for CVE-2021-47288",
"url": "https://bugzilla.suse.com/1224889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47288"
},
{
"cve": "CVE-2021-47301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igb_poll() runs\nwhile the controller is reset this can lead to the driver try to free\na skb that was already freed.\n\n(The crash is harder to reproduce with the igb driver, but the same\npotential problem exists as the code is identical to igc)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47301",
"url": "https://www.suse.com/security/cve/CVE-2021-47301"
},
{
"category": "external",
"summary": "SUSE Bug 1224916 for CVE-2021-47301",
"url": "https://bugzilla.suse.com/1224916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47301"
},
{
"cve": "CVE-2021-47302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47302"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Fix use-after-free error during reset\n\nCleans the next descriptor to watch (next_to_watch) when cleaning the\nTX ring.\n\nFailure to do so can cause invalid memory accesses. If igc_poll() runs\nwhile the controller is being reset this can lead to the driver try to\nfree a skb that was already freed.\n\nLog message:\n\n [ 101.525242] refcount_t: underflow; use-after-free.\n [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0\n [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)\n x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)\n ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)\n rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)\n soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)\n iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)\n soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)\n autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)\n i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)\n [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)\n e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)\n usbcore(E) drm(E) button(E) video(E)\n [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe\n [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017\n [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0\n [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48\n 44 01 01 e8 d1 c6 42 00 \u003c0f\u003e 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3\n [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286\n [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001\n [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff\n [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50\n [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00\n [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40\n [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000\n [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0\n [ 101.525343] Call Trace:\n [ 101.525346] sock_wfree+0x9c/0xa0\n [ 101.525353] unix_destruct_scm+0x7b/0xa0\n [ 101.525358] skb_release_head_state+0x40/0x90\n [ 101.525362] skb_release_all+0xe/0x30\n [ 101.525364] napi_consume_skb+0x57/0x160\n [ 101.525367] igc_poll+0xb7/0xc80 [igc]\n [ 101.525376] ? sched_clock+0x5/0x10\n [ 101.525381] ? sched_clock_cpu+0xe/0x100\n [ 101.525385] net_rx_action+0x14c/0x410\n [ 101.525388] __do_softirq+0xe9/0x2f4\n [ 101.525391] __local_bh_enable_ip+0xe3/0x110\n [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0\n [ 101.525398] irq_forced_thread_fn+0x6a/0x80\n [ 101.525401] irq_thread+0xe8/0x180\n [ 101.525403] ? wake_threads_waitq+0x30/0x30\n [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0\n [ 101.525408] kthread+0x183/0x1a0\n [ 101.525412] ? kthread_park+0x80/0x80\n [ 101.525415] ret_from_fork+0x22/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47302",
"url": "https://www.suse.com/security/cve/CVE-2021-47302"
},
{
"category": "external",
"summary": "SUSE Bug 1224917 for CVE-2021-47302",
"url": "https://bugzilla.suse.com/1224917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47302"
},
{
"cve": "CVE-2021-47305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47305"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sync_file: Don\u0027t leak fences on merge failure\n\nEach add_fence() call does a dma_fence_get() on the relevant fence. In\nthe error path, we weren\u0027t calling dma_fence_put() so all those fences\ngot leaked. Also, in the krealloc_array failure case, we weren\u0027t\nfreeing the fences array. Instead, ensure that i and fences are always\nzero-initialized and dma_fence_put() all the fences and kfree(fences) on\nevery error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47305",
"url": "https://www.suse.com/security/cve/CVE-2021-47305"
},
{
"category": "external",
"summary": "SUSE Bug 1224968 for CVE-2021-47305",
"url": "https://bugzilla.suse.com/1224968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47305"
},
{
"cve": "CVE-2021-47307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47307"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent NULL deref in cifs_compose_mount_options()\n\nThe optional @ref parameter might contain an NULL node_name, so\nprevent dereferencing it in cifs_compose_mount_options().\n\nAddresses-Coverity: 1476408 (\"Explicit null dereferenced\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47307",
"url": "https://www.suse.com/security/cve/CVE-2021-47307"
},
{
"category": "external",
"summary": "SUSE Bug 1224961 for CVE-2021-47307",
"url": "https://bugzilla.suse.com/1224961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47307"
},
{
"cve": "CVE-2021-47308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47308"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix array index out of bound exception\n\nFix array index out of bound exception in fc_rport_prli_resp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47308",
"url": "https://www.suse.com/security/cve/CVE-2021-47308"
},
{
"category": "external",
"summary": "SUSE Bug 1224963 for CVE-2021-47308",
"url": "https://bugzilla.suse.com/1224963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47308"
},
{
"cve": "CVE-2021-47310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47310"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47310",
"url": "https://www.suse.com/security/cve/CVE-2021-47310"
},
{
"category": "external",
"summary": "SUSE Bug 1224959 for CVE-2021-47310",
"url": "https://bugzilla.suse.com/1224959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47310"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47314"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure. Fix this by using resource-managed allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47314",
"url": "https://www.suse.com/security/cve/CVE-2021-47314"
},
{
"category": "external",
"summary": "SUSE Bug 1224893 for CVE-2021-47314",
"url": "https://bugzilla.suse.com/1224893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47314"
},
{
"cve": "CVE-2021-47315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47315"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory. Smatch reports:\n\n drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: \u0027fsl_ifc_ctrl_dev-\u003egregs\u0027 not released on lines: 298.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47315",
"url": "https://www.suse.com/security/cve/CVE-2021-47315"
},
{
"category": "external",
"summary": "SUSE Bug 1224892 for CVE-2021-47315",
"url": "https://bugzilla.suse.com/1224892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47315"
},
{
"cve": "CVE-2021-47319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk-\u003evqs should be freed before we call init_vqs()\nin virtblk_restore().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47319",
"url": "https://www.suse.com/security/cve/CVE-2021-47319"
},
{
"category": "external",
"summary": "SUSE Bug 1225054 for CVE-2021-47319",
"url": "https://bugzilla.suse.com/1225054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47319"
},
{
"cve": "CVE-2021-47320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47320"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47320",
"url": "https://www.suse.com/security/cve/CVE-2021-47320"
},
{
"category": "external",
"summary": "SUSE Bug 1225058 for CVE-2021-47320",
"url": "https://bugzilla.suse.com/1225058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47320"
},
{
"cve": "CVE-2021-47321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47321",
"url": "https://www.suse.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "SUSE Bug 1225060 for CVE-2021-47321",
"url": "https://bugzilla.suse.com/1225060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47321"
},
{
"cve": "CVE-2021-47323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47323"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47323",
"url": "https://www.suse.com/security/cve/CVE-2021-47323"
},
{
"category": "external",
"summary": "SUSE Bug 1225026 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1225026"
},
{
"category": "external",
"summary": "SUSE Bug 1227557 for CVE-2021-47323",
"url": "https://bugzilla.suse.com/1227557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47323"
},
{
"cve": "CVE-2021-47324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47324"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47324",
"url": "https://www.suse.com/security/cve/CVE-2021-47324"
},
{
"category": "external",
"summary": "SUSE Bug 1225030 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225030"
},
{
"category": "external",
"summary": "SUSE Bug 1225038 for CVE-2021-47324",
"url": "https://bugzilla.suse.com/1225038"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47324"
},
{
"cve": "CVE-2021-47330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47330"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: 8250: serial_cs: Fix a memory leak in error handling path\n\nIn the probe function, if the final \u0027serial_config()\u0027 fails, \u0027info\u0027 is\nleaking.\n\nAdd a resource handling path to free this memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47330",
"url": "https://www.suse.com/security/cve/CVE-2021-47330"
},
{
"category": "external",
"summary": "SUSE Bug 1225084 for CVE-2021-47330",
"url": "https://bugzilla.suse.com/1225084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47330"
},
{
"cve": "CVE-2021-47334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47334"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/libmasm/module: Fix two use after free in ibmasm_init_one\n\nIn ibmasm_init_one, it calls ibmasm_init_remote_input_dev().\nInside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are\nallocated by input_allocate_device(), and assigned to\nsp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev respectively.\n\nIn the err_free_devices error branch of ibmasm_init_one,\nmouse_dev and keybd_dev are freed by input_free_device(), and return\nerror. Then the execution runs into error_send_message error branch\nof ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called\nto unregister the freed sp-\u003eremote.mouse_dev and sp-\u003eremote.keybd_dev.\n\nMy patch add a \"error_init_remote\" label to handle the error of\nibmasm_init_remote_input_dev(), to avoid the uaf bugs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47334",
"url": "https://www.suse.com/security/cve/CVE-2021-47334"
},
{
"category": "external",
"summary": "SUSE Bug 1225112 for CVE-2021-47334",
"url": "https://bugzilla.suse.com/1225112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47334"
},
{
"cve": "CVE-2021-47337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47337"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix bad pointer dereference when ehandler kthread is invalid\n\nCommit 66a834d09293 (\"scsi: core: Fix error handling of scsi_host_alloc()\")\nchanged the allocation logic to call put_device() to perform host cleanup\nwith the assumption that IDA removal and stopping the kthread would\nproperly be performed in scsi_host_dev_release(). However, in the unlikely\ncase that the error handler thread fails to spawn, shost-\u003eehandler is set\nto ERR_PTR(-ENOMEM).\n\nThe error handler cleanup code in scsi_host_dev_release() will call\nkthread_stop() if shost-\u003eehandler != NULL which will always be the case\nwhether the kthread was successfully spawned or not. In the case that it\nfailed to spawn this has the nasty side effect of trying to dereference an\ninvalid pointer when kthread_stop() is called. The following splat provides\nan example of this behavior in the wild:\n\nscsi host11: error handler thread failed to spawn, error = -4\nKernel attempted to read user page (10c) - exploit attempt? (uid: 0)\nBUG: Kernel NULL pointer dereference on read at 0x0000010c\nFaulting instruction address: 0xc00000000818e9a8\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region\n hash dm_log dm_mod fuse overlay squashfs loop\nCPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1\nNIP: c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8\nREGS: c000000037d12ea0 TRAP: 0300 Not tainted (5.13.0-rc7)\nMSR: 800000000280b033 \u0026lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u0026gt; CR: 28228228\nXER: 20040001\nCFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0\nGPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc\nGPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000\nGPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff\nGPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0\nGPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288\nGPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898\nGPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000\nGPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc\nNIP [c00000000818e9a8] kthread_stop+0x38/0x230\nLR [c0000000089846e8] scsi_host_dev_release+0x98/0x160\nCall Trace:\n[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)\n[c0000000089846e8] scsi_host_dev_release+0x98/0x160\n[c00000000891e960] device_release+0x60/0x100\n[c0000000087e55c4] kobject_release+0x84/0x210\n[c00000000891ec78] put_device+0x28/0x40\n[c000000008984ea4] scsi_host_alloc+0x314/0x430\n[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]\n[c000000008110104] vio_bus_probe+0xa4/0x4b0\n[c00000000892a860] really_probe+0x140/0x680\n[c00000000892aefc] driver_probe_device+0x15c/0x200\n[c00000000892b63c] device_driver_attach+0xcc/0xe0\n[c00000000892b740] __driver_attach+0xf0/0x200\n[c000000008926f28] bus_for_each_dev+0xa8/0x130\n[c000000008929ce4] driver_attach+0x34/0x50\n[c000000008928fc0] bus_add_driver+0x1b0/0x300\n[c00000000892c798] driver_register+0x98/0x1a0\n[c00000000810eb60] __vio_register_driver+0x80/0xe0\n[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]\n[c0000000080121d0] do_one_initcall+0x60/0x2d0\n[c000000008261abc] do_init_module+0x7c/0x320\n[c000000008265700] load_module+0x2350/0x25b0\n[c000000008265cb4] __do_sys_finit_module+0xd4/0x160\n[c000000008031110] system_call_exception+0x150/0x2d0\n[c00000000800d35c] system_call_common+0xec/0x278\n\nFix this be nulling shost-\u003eehandler when the kthread fails to spawn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47337",
"url": "https://www.suse.com/security/cve/CVE-2021-47337"
},
{
"category": "external",
"summary": "SUSE Bug 1224926 for CVE-2021-47337",
"url": "https://bugzilla.suse.com/1224926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47337"
},
{
"cve": "CVE-2021-47343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: assign new_root only when removal succeeds\n\nremove_raw() in dm_btree_remove() may fail due to IO read error\n(e.g. read the content of origin block fails during shadowing),\nand the value of shadow_spine::root is uninitialized, but\nthe uninitialized value is still assign to new_root in the\nend of dm_btree_remove().\n\nFor dm-thin, the value of pmd-\u003edetails_root or pmd-\u003eroot will become\nan uninitialized value, so if trying to read details_info tree again\nout-of-bound memory may occur as showed below:\n\n general protection fault, probably for non-canonical address 0x3fdcb14c8d7520\n CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6\n Hardware name: QEMU Standard PC\n RIP: 0010:metadata_ll_load_ie+0x14/0x30\n Call Trace:\n sm_metadata_count_is_more_than_one+0xb9/0xe0\n dm_tm_shadow_block+0x52/0x1c0\n shadow_step+0x59/0xf0\n remove_raw+0xb2/0x170\n dm_btree_remove+0xf4/0x1c0\n dm_pool_delete_thin_device+0xc3/0x140\n pool_message+0x218/0x2b0\n target_message+0x251/0x290\n ctl_ioctl+0x1c4/0x4d0\n dm_ctl_ioctl+0xe/0x20\n __x64_sys_ioctl+0x7b/0xb0\n do_syscall_64+0x40/0xb0\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFixing it by only assign new_root when removal succeeds",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47343",
"url": "https://www.suse.com/security/cve/CVE-2021-47343"
},
{
"category": "external",
"summary": "SUSE Bug 1225155 for CVE-2021-47343",
"url": "https://bugzilla.suse.com/1225155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47343"
},
{
"cve": "CVE-2021-47344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47344"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: zr364xx: fix memory leak in zr364xx_start_readpipe\n\nsyzbot reported memory leak in zr364xx driver.\nThe problem was in non-freed urb in case of\nusb_submit_urb() fail.\n\nbacktrace:\n [\u003cffffffff82baedf6\u003e] kmalloc include/linux/slab.h:561 [inline]\n [\u003cffffffff82baedf6\u003e] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74\n [\u003cffffffff82f7cce8\u003e] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022\n [\u003cffffffff84251dfc\u003e] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]\n [\u003cffffffff84251dfc\u003e] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516\n [\u003cffffffff82bb6507\u003e] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [\u003cffffffff826018a9\u003e] really_probe+0x159/0x500 drivers/base/dd.c:576",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47344",
"url": "https://www.suse.com/security/cve/CVE-2021-47344"
},
{
"category": "external",
"summary": "SUSE Bug 1224922 for CVE-2021-47344",
"url": "https://bugzilla.suse.com/1224922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47344"
},
{
"cve": "CVE-2021-47345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47345"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix rdma_resolve_route() memory leak\n\nFix a memory leak when \"mda_resolve_route() is called more than once on\nthe same \"rdma_cm_id\".\n\nThis is possible if cma_query_handler() triggers the\nRDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and\nallows rdma_resolve_route() to be called again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47345",
"url": "https://www.suse.com/security/cve/CVE-2021-47345"
},
{
"category": "external",
"summary": "SUSE Bug 1225157 for CVE-2021-47345",
"url": "https://bugzilla.suse.com/1225157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47345"
},
{
"cve": "CVE-2021-47347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47347"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47347",
"url": "https://www.suse.com/security/cve/CVE-2021-47347"
},
{
"category": "external",
"summary": "SUSE Bug 1225177 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225177"
},
{
"category": "external",
"summary": "SUSE Bug 1225305 for CVE-2021-47347",
"url": "https://bugzilla.suse.com/1225305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47347"
},
{
"cve": "CVE-2021-47352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47352"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47352",
"url": "https://www.suse.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "SUSE Bug 1225124 for CVE-2021-47352",
"url": "https://bugzilla.suse.com/1225124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47352"
},
{
"cve": "CVE-2021-47353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47353"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47353",
"url": "https://www.suse.com/security/cve/CVE-2021-47353"
},
{
"category": "external",
"summary": "SUSE Bug 1225128 for CVE-2021-47353",
"url": "https://bugzilla.suse.com/1225128"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47353"
},
{
"cve": "CVE-2021-47355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47355"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: nicstar: Fix possible use-after-free in nicstar_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47355",
"url": "https://www.suse.com/security/cve/CVE-2021-47355"
},
{
"category": "external",
"summary": "SUSE Bug 1225141 for CVE-2021-47355",
"url": "https://bugzilla.suse.com/1225141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47355"
},
{
"cve": "CVE-2021-47356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47356",
"url": "https://www.suse.com/security/cve/CVE-2021-47356"
},
{
"category": "external",
"summary": "SUSE Bug 1225143 for CVE-2021-47356",
"url": "https://bugzilla.suse.com/1225143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47356"
},
{
"cve": "CVE-2021-47357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47357"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module\u0027s remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver\u0027s remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47357",
"url": "https://www.suse.com/security/cve/CVE-2021-47357"
},
{
"category": "external",
"summary": "SUSE Bug 1225144 for CVE-2021-47357",
"url": "https://bugzilla.suse.com/1225144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47357"
},
{
"cve": "CVE-2021-47361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix error handling in mcb_alloc_bus()\n\nThere are two bugs:\n1) If ida_simple_get() fails then this code calls put_device(carrier)\n but we haven\u0027t yet called get_device(carrier) and probably that\n leads to a use after free.\n2) After device_initialize() then we need to use put_device() to\n release the bus. This will free the internal resources tied to the\n device and call mcb_free_bus() which will free the rest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47361",
"url": "https://www.suse.com/security/cve/CVE-2021-47361"
},
{
"category": "external",
"summary": "SUSE Bug 1225151 for CVE-2021-47361",
"url": "https://bugzilla.suse.com/1225151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2021-47362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47362"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Update intermediate power state for SI\n\nUpdate the current state as boot state during dpm initialization.\nDuring the subsequent initialization, set_power_state gets called to\ntransition to the final power state. set_power_state refers to values\nfrom the current state and without current state populated, it could\nresult in NULL pointer dereference.\n\nFor ex: on platforms where PCI speed change is supported through ACPI\nATCS method, the link speed of current state needs to be queried before\ndeciding on changing to final power state\u0027s link speed. The logic to query\nATCS-support was broken on certain platforms. The issue became visible\nwhen broken ATCS-support logic got fixed with commit\nf9b7f3703ff9 (\"drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)\").\n\nBug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47362",
"url": "https://www.suse.com/security/cve/CVE-2021-47362"
},
{
"category": "external",
"summary": "SUSE Bug 1225153 for CVE-2021-47362",
"url": "https://bugzilla.suse.com/1225153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47362"
},
{
"cve": "CVE-2021-47369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47369"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix NULL deref in qeth_clear_working_pool_list()\n\nWhen qeth_set_online() calls qeth_clear_working_pool_list() to roll\nback after an error exit from qeth_hardsetup_card(), we are at risk of\naccessing card-\u003eqdio.in_q before it was allocated by\nqeth_alloc_qdio_queues() via qeth_mpc_initialize().\n\nqeth_clear_working_pool_list() then dereferences NULL, and by writing to\nqueue-\u003ebufs[i].pool_entry scribbles all over the CPU\u0027s lowcore.\nResulting in a crash when those lowcore areas are used next (eg. on\nthe next machine-check interrupt).\n\nSuch a scenario would typically happen when the device is first set\nonline and its queues aren\u0027t allocated yet. An early IO error or certain\nmisconfigs (eg. mismatched transport mode, bad portno) then cause us to\nerror out from qeth_hardsetup_card() with card-\u003eqdio.in_q still being\nNULL.\n\nFix it by checking the pointer for NULL before accessing it.\n\nNote that we also have (rare) paths inside qeth_mpc_initialize() where\na configuration change can cause us to free the existing queues,\nexpecting that subsequent code will allocate them again. If we then\nerror out before that re-allocation happens, the same bug occurs.\n\nRoot-caused-by: Heiko Carstens \u003chca@linux.ibm.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47369",
"url": "https://www.suse.com/security/cve/CVE-2021-47369"
},
{
"category": "external",
"summary": "SUSE Bug 1225164 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1225164"
},
{
"category": "external",
"summary": "SUSE Bug 1227324 for CVE-2021-47369",
"url": "https://bugzilla.suse.com/1227324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47369"
},
{
"cve": "CVE-2021-47375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47375"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblktrace: Fix uaf in blk_trace access after removing by sysfs\n\nThere is an use-after-free problem triggered by following process:\n\n P1(sda)\t\t\t\tP2(sdb)\n\t\t\techo 0 \u003e /sys/block/sdb/trace/enable\n\t\t\t blk_trace_remove_queue\n\t\t\t synchronize_rcu\n\t\t\t blk_trace_free\n\t\t\t relay_close\nrcu_read_lock\n__blk_add_trace\n trace_note_tsk\n (Iterate running_trace_list)\n\t\t\t relay_close_buf\n\t\t\t\t relay_destroy_buf\n\t\t\t\t kfree(buf)\n trace_note(sdb\u0027s bt)\n relay_reserve\n buf-\u003eoffset \u003c- nullptr deference (use-after-free) !!!\nrcu_read_unlock\n\n[ 502.714379] BUG: kernel NULL pointer dereference, address:\n0000000000000010\n[ 502.715260] #PF: supervisor read access in kernel mode\n[ 502.715903] #PF: error_code(0x0000) - not-present page\n[ 502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0\n[ 502.717252] Oops: 0000 [#1] SMP\n[ 502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360\n[ 502.732872] Call Trace:\n[ 502.733193] __blk_add_trace.cold+0x137/0x1a3\n[ 502.733734] blk_add_trace_rq+0x7b/0xd0\n[ 502.734207] blk_add_trace_rq_issue+0x54/0xa0\n[ 502.734755] blk_mq_start_request+0xde/0x1b0\n[ 502.735287] scsi_queue_rq+0x528/0x1140\n...\n[ 502.742704] sg_new_write.isra.0+0x16e/0x3e0\n[ 502.747501] sg_ioctl+0x466/0x1100\n\nReproduce method:\n ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sda, BLKTRACESTART)\n ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])\n ioctl(/dev/sdb, BLKTRACESTART)\n\n echo 0 \u003e /sys/block/sdb/trace/enable \u0026\n // Add delay(mdelay/msleep) before kernel enters blk_trace_free()\n\n ioctl$SG_IO(/dev/sda, SG_IO, ...)\n // Enters trace_note_tsk() after blk_trace_free() returned\n // Use mdelay in rcu region rather than msleep(which may schedule out)\n\nRemove blk_trace from running_list before calling blk_trace_free() by\nsysfs if blk_trace is at Blktrace_running state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47375",
"url": "https://www.suse.com/security/cve/CVE-2021-47375"
},
{
"category": "external",
"summary": "SUSE Bug 1225193 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225193"
},
{
"category": "external",
"summary": "SUSE Bug 1225194 for CVE-2021-47375",
"url": "https://bugzilla.suse.com/1225194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47375"
},
{
"cve": "CVE-2021-47378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47378"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: destroy cm id before destroy qp to avoid use after free\n\nWe should always destroy cm_id before destroy qp to avoid to get cma\nevent after qp was destroyed, which may lead to use after free.\nIn RDMA connection establishment error flow, don\u0027t destroy qp in cm\nevent handler.Just report cm_error to upper level, qp will be destroy\nin nvme_rdma_alloc_queue() after destroy cm id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47378",
"url": "https://www.suse.com/security/cve/CVE-2021-47378"
},
{
"category": "external",
"summary": "SUSE Bug 1225201 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225201"
},
{
"category": "external",
"summary": "SUSE Bug 1225202 for CVE-2021-47378",
"url": "https://bugzilla.suse.com/1225202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47378"
},
{
"cve": "CVE-2021-47382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47382"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/qeth: fix deadlock during failing recovery\n\nCommit 0b9902c1fcc5 (\"s390/qeth: fix deadlock during recovery\") removed\ntaking discipline_mutex inside qeth_do_reset(), fixing potential\ndeadlocks. An error path was missed though, that still takes\ndiscipline_mutex and thus has the original deadlock potential.\n\nIntermittent deadlocks were seen when a qeth channel path is configured\noffline, causing a race between qeth_do_reset and ccwgroup_remove.\nCall qeth_set_offline() directly in the qeth_do_reset() error case and\nthen a new variant of ccwgroup_set_offline(), without taking\ndiscipline_mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47382",
"url": "https://www.suse.com/security/cve/CVE-2021-47382"
},
{
"category": "external",
"summary": "SUSE Bug 1225207 for CVE-2021-47382",
"url": "https://bugzilla.suse.com/1225207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47382"
},
{
"cve": "CVE-2021-47383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47383",
"url": "https://www.suse.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "SUSE Bug 1225208 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225208"
},
{
"category": "external",
"summary": "SUSE Bug 1225211 for CVE-2021-47383",
"url": "https://bugzilla.suse.com/1225211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47391"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n CPU 1 CPU 2\n\nrdma_resolve_addr():\n RDMA_CM_IDLE -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler) #1\n\n\t\t\t process_one_req(): for #1\n addr_handler():\n RDMA_CM_ADDR_QUERY -\u003e RDMA_CM_ADDR_BOUND\n mutex_unlock(\u0026id_priv-\u003ehandler_mutex);\n [.. handler still running ..]\n\nrdma_resolve_addr():\n RDMA_CM_ADDR_BOUND -\u003e RDMA_CM_ADDR_QUERY\n rdma_resolve_ip(addr_handler)\n !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n _destroy_id():\n cma_cancel_operation():\n rdma_addr_cancel()\n\n // process_one_req() self removes it\n\t\t spin_lock_bh(\u0026lock);\n cancel_delayed_work(\u0026req-\u003ework);\n\t if (!list_empty(\u0026req-\u003elist)) == true\n\n ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n addr_handler():\n\t mutex_lock(\u0026id_priv-\u003ehandler_mutex);\n !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn\u0027t cost anything in the normal flow\nthat never uses this strange error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47391",
"url": "https://www.suse.com/security/cve/CVE-2021-47391"
},
{
"category": "external",
"summary": "SUSE Bug 1225318 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225318"
},
{
"category": "external",
"summary": "SUSE Bug 1225319 for CVE-2021-47391",
"url": "https://bugzilla.suse.com/1225319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47391"
},
{
"cve": "CVE-2021-47397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47397"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb\n\nWe should always check if skb_header_pointer\u0027s return is NULL before\nusing it, otherwise it may cause null-ptr-deref, as syzbot reported:\n\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]\n RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196\n Call Trace:\n \u003cIRQ\u003e\n sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109\n ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422\n ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472\n dst_input include/net/dst.h:460 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]\n NF_HOOK include/linux/netfilter.h:307 [inline]\n NF_HOOK include/linux/netfilter.h:301 [inline]\n ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47397",
"url": "https://www.suse.com/security/cve/CVE-2021-47397"
},
{
"category": "external",
"summary": "SUSE Bug 1225082 for CVE-2021-47397",
"url": "https://bugzilla.suse.com/1225082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47397"
},
{
"cve": "CVE-2021-47400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47400"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: do not allow call hns3_nic_net_open repeatedly\n\nhns3_nic_net_open() is not allowed to called repeatly, but there\nis no checking for this. When doing device reset and setup tc\nconcurrently, there is a small oppotunity to call hns3_nic_net_open\nrepeatedly, and cause kernel bug by calling napi_enable twice.\n\nThe calltrace information is like below:\n[ 3078.222780] ------------[ cut here ]------------\n[ 3078.230255] kernel BUG at net/core/dev.c:6991!\n[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)\n[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G O 5.14.0-rc4+ #1\n[ 3078.269102] Hardware name: , BIOS KpxxxFPGA 1P B600 V181 08/12/2021\n[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]\n[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[ 3078.296168] pc : napi_enable+0x80/0x84\ntc qdisc sho[w 3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]\n\n[ 3078.314771] sp : ffff8000108abb20\n[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300\n[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000\n[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880\n[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000\n[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930\n[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4\n[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8\n[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344\n[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938\n[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0\n[ 3078.414657] Call trace:\n[ 3078.418517] napi_enable+0x80/0x84\n[ 3078.424626] hns3_reset_notify_up_enet+0x78/0xd0 [hns3]\n[ 3078.433469] hns3_reset_notify+0x64/0x80 [hns3]\n[ 3078.441430] hclge_notify_client+0x68/0xb0 [hclge]\n[ 3078.450511] hclge_reset_rebuild+0x524/0x884 [hclge]\n[ 3078.458879] hclge_reset_service_task+0x3c4/0x680 [hclge]\n[ 3078.467470] hclge_service_task+0xb0/0xb54 [hclge]\n[ 3078.475675] process_one_work+0x1dc/0x48c\n[ 3078.481888] worker_thread+0x15c/0x464\n[ 3078.487104] kthread+0x160/0x170\n[ 3078.492479] ret_from_fork+0x10/0x18\n[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)\n[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---\n\nOnce hns3_nic_net_open() is excute success, the flag\nHNS3_NIC_STATE_DOWN will be cleared. So add checking for this\nflag, directly return when HNS3_NIC_STATE_DOWN is no set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47400",
"url": "https://www.suse.com/security/cve/CVE-2021-47400"
},
{
"category": "external",
"summary": "SUSE Bug 1225329 for CVE-2021-47400",
"url": "https://bugzilla.suse.com/1225329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47400"
},
{
"cve": "CVE-2021-47401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipack: ipoctal: fix stack information leak\n\nThe tty driver name is used also after registering the driver and must\nspecifically not be allocated on the stack to avoid leaking information\nto user space (or triggering an oops).\n\nDrivers should not try to encode topology information in the tty device\nname but this one snuck in through staging without anyone noticing and\nanother driver has since copied this malpractice.\n\nFixing the ABI is a separate issue, but this at least plugs the security\nhole.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47401",
"url": "https://www.suse.com/security/cve/CVE-2021-47401"
},
{
"category": "external",
"summary": "SUSE Bug 1225242 for CVE-2021-47401",
"url": "https://bugzilla.suse.com/1225242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47401"
},
{
"cve": "CVE-2021-47404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47404"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: fix slab-out-of-bounds Write in betop_probe\n\nSyzbot reported slab-out-of-bounds Write bug in hid-betopff driver.\nThe problem is the driver assumes the device must have an input report but\nsome malicious devices violate this assumption.\n\nSo this patch checks hid_device\u0027s input is non empty before it\u0027s been used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47404",
"url": "https://www.suse.com/security/cve/CVE-2021-47404"
},
{
"category": "external",
"summary": "SUSE Bug 1225303 for CVE-2021-47404",
"url": "https://bugzilla.suse.com/1225303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47404"
},
{
"cve": "CVE-2021-47409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47409"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47409",
"url": "https://www.suse.com/security/cve/CVE-2021-47409"
},
{
"category": "external",
"summary": "SUSE Bug 1225330 for CVE-2021-47409",
"url": "https://bugzilla.suse.com/1225330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47409"
},
{
"cve": "CVE-2021-47416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47416"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: mdio: fix memory leak\n\nSyzbot reported memory leak in MDIO bus interface, the problem was in\nwrong state logic.\n\nMDIOBUS_ALLOCATED indicates 2 states:\n\t1. Bus is only allocated\n\t2. Bus allocated and __mdiobus_register() fails, but\n\t device_register() was called\n\nIn case of device_register() has been called we should call put_device()\nto correctly free the memory allocated for this device, but mdiobus_free()\ncalls just kfree(dev) in case of MDIOBUS_ALLOCATED state\n\nTo avoid this behaviour we need to set bus-\u003estate to MDIOBUS_UNREGISTERED\n_before_ calling device_register(), because put_device() should be\ncalled even in case of device_register() failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47416",
"url": "https://www.suse.com/security/cve/CVE-2021-47416"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225189"
},
{
"category": "external",
"summary": "SUSE Bug 1225336 for CVE-2021-47416",
"url": "https://bugzilla.suse.com/1225336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47416"
},
{
"cve": "CVE-2021-47423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47423"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/debugfs: fix file release memory leak\n\nWhen using single_open() for opening, single_release() should be\ncalled, otherwise the \u0027op\u0027 allocated in single_open() will be leaked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47423",
"url": "https://www.suse.com/security/cve/CVE-2021-47423"
},
{
"category": "external",
"summary": "SUSE Bug 1225366 for CVE-2021-47423",
"url": "https://bugzilla.suse.com/1225366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47423"
},
{
"cve": "CVE-2021-47424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47424"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix freeing of uninitialized misc IRQ vector\n\nWhen VSI set up failed in i40e_probe() as part of PF switch set up\ndriver was trying to free misc IRQ vectors in\ni40e_clear_interrupt_scheme and produced a kernel Oops:\n\n Trying to free already-free IRQ 266\n WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300\n Workqueue: events work_for_cpu_fn\n RIP: 0010:__free_irq+0x9a/0x300\n Call Trace:\n ? synchronize_irq+0x3a/0xa0\n free_irq+0x2e/0x60\n i40e_clear_interrupt_scheme+0x53/0x190 [i40e]\n i40e_probe.part.108+0x134b/0x1a40 [i40e]\n ? kmem_cache_alloc+0x158/0x1c0\n ? acpi_ut_update_ref_count.part.1+0x8e/0x345\n ? acpi_ut_update_object_reference+0x15e/0x1e2\n ? strstr+0x21/0x70\n ? irq_get_irq_data+0xa/0x20\n ? mp_check_pin_attr+0x13/0xc0\n ? irq_get_irq_data+0xa/0x20\n ? mp_map_pin_to_irq+0xd3/0x2f0\n ? acpi_register_gsi_ioapic+0x93/0x170\n ? pci_conf1_read+0xa4/0x100\n ? pci_bus_read_config_word+0x49/0x70\n ? do_pci_enable_device+0xcc/0x100\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x112/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe problem is that at that point misc IRQ vectors\nwere not allocated yet and we get a call trace\nthat driver is trying to free already free IRQ vectors.\n\nAdd a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED\nPF state before calling i40e_free_misc_vector. This state is set only if\nmisc IRQ vectors were properly initialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47424",
"url": "https://www.suse.com/security/cve/CVE-2021-47424"
},
{
"category": "external",
"summary": "SUSE Bug 1225367 for CVE-2021-47424",
"url": "https://bugzilla.suse.com/1225367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47424"
},
{
"cve": "CVE-2021-47431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47431"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix gart.bo pin_count leak\n\ngmc_v{9,10}_0_gart_disable() isn\u0027t called matched with\ncorrespoding gart_enbale function in SRIOV case. This will\nlead to gart.bo pin_count leak on driver unload.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47431",
"url": "https://www.suse.com/security/cve/CVE-2021-47431"
},
{
"category": "external",
"summary": "SUSE Bug 1225390 for CVE-2021-47431",
"url": "https://bugzilla.suse.com/1225390"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47431"
},
{
"cve": "CVE-2021-47435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47435"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47435",
"url": "https://www.suse.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "SUSE Bug 1225247 for CVE-2021-47435",
"url": "https://bugzilla.suse.com/1225247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47435"
},
{
"cve": "CVE-2021-47436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: dsps: Fix the probe error path\n\nCommit 7c75bde329d7 (\"usb: musb: musb_dsps: request_irq() after\ninitializing musb\") has inverted the calls to\ndsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without\nupdating correctly the error path. dsps_create_musb_pdev() allocates and\nregisters a new platform device which must be unregistered and freed\nwith platform_device_unregister(), and this is missing upon\ndsps_setup_optional_vbus_irq() error.\n\nWhile on the master branch it seems not to trigger any issue, I observed\na kernel crash because of a NULL pointer dereference with a v5.10.70\nstable kernel where the patch mentioned above was backported. With this\nkernel version, -EPROBE_DEFER is returned the first time\ndsps_setup_optional_vbus_irq() is called which triggers the probe to\nerror out without unregistering the platform device. Unfortunately, on\nthe Beagle Bone Black Wireless, the platform device still living in the\nsystem is being used by the USB Ethernet gadget driver, which during the\nboot phase triggers the crash.\n\nMy limited knowledge of the musb world prevents me to revert this commit\nwhich was sent to silence a robot warning which, as far as I understand,\ndoes not make sense. The goal of this patch was to prevent an IRQ to\nfire before the platform device being registered. I think this cannot\never happen due to the fact that enabling the interrupts is done by the\n-\u003eenable() callback of the platform musb device, and this platform\ndevice must be already registered in order for the core or any other\nuser to use this callback.\n\nHence, I decided to fix the error path, which might prevent future\nerrors on mainline kernels while also fixing older ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47436",
"url": "https://www.suse.com/security/cve/CVE-2021-47436"
},
{
"category": "external",
"summary": "SUSE Bug 1225244 for CVE-2021-47436",
"url": "https://bugzilla.suse.com/1225244"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47436"
},
{
"cve": "CVE-2021-47456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47456"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing \u0027chan\u0027 again after\nreleasing \u0027dev\u0027 will cause UAF.\n\nFix this by releasing \u0027dev\u0027 later.\n\nThe following log reveals it:\n\n[ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[ 35.965513 ] Call Trace:\n[ 35.965718 ] dump_stack_lvl+0xa8/0xd1\n[ 35.966028 ] print_address_description+0x87/0x3b0\n[ 35.966420 ] kasan_report+0x172/0x1c0\n[ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170\n[ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967945 ] __asan_report_load8_noabort+0x14/0x20\n[ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.968752 ] pci_device_remove+0xa9/0x250",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47456",
"url": "https://www.suse.com/security/cve/CVE-2021-47456"
},
{
"category": "external",
"summary": "SUSE Bug 1225256 for CVE-2021-47456",
"url": "https://bugzilla.suse.com/1225256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47456"
},
{
"cve": "CVE-2021-47458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47458"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below. Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated. This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n detected buffer overflow in strlen\n ------------[ cut here ]------------\n kernel BUG at lib/string.c:1149!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n Debian 5.14.6-2\n RIP: 0010:fortify_panic+0xf/0x11\n ...\n Call Trace:\n ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n mount_bdev+0x185/0x1b0\n legacy_get_tree+0x27/0x40\n vfs_get_tree+0x25/0xb0\n path_mount+0x454/0xa20\n __x64_sys_mount+0x103/0x140\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47458",
"url": "https://www.suse.com/security/cve/CVE-2021-47458"
},
{
"category": "external",
"summary": "SUSE Bug 1225252 for CVE-2021-47458",
"url": "https://bugzilla.suse.com/1225252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47458"
},
{
"cve": "CVE-2021-47460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47460"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after conversion from inline format\n\nCommit 6dbf7bb55598 (\"fs: Don\u0027t invalidate page buffers in\nblock_write_full_page()\") uncovered a latent bug in ocfs2 conversion\nfrom inline inode format to a normal inode format.\n\nThe code in ocfs2_convert_inline_data_to_extents() attempts to zero out\nthe whole cluster allocated for file data by grabbing, zeroing, and\ndirtying all pages covering this cluster. However these pages are\nbeyond i_size, thus writeback code generally ignores these dirty pages\nand no blocks were ever actually zeroed on the disk.\n\nThis oversight was fixed by commit 693c241a5f6a (\"ocfs2: No need to zero\npages past i_size.\") for standard ocfs2 write path, inline conversion\npath was apparently forgotten; the commit log also has a reasoning why\nthe zeroing actually is not needed.\n\nAfter commit 6dbf7bb55598, things became worse as writeback code stopped\ninvalidating buffers on pages beyond i_size and thus these pages end up\nwith clean PageDirty bit but with buffers attached to these pages being\nstill dirty. So when a file is converted from inline format, then\nwriteback triggers, and then the file is grown so that these pages\nbecome valid, the invalid dirtiness state is preserved,\nmark_buffer_dirty() does nothing on these pages (buffers are already\ndirty) but page is never written back because it is clean. So data\nwritten to these pages is lost once pages are reclaimed.\n\nSimple reproducer for the problem is:\n\n xfs_io -f -c \"pwrite 0 2000\" -c \"pwrite 2000 2000\" -c \"fsync\" \\\n -c \"pwrite 4000 2000\" ocfs2_file\n\nAfter unmounting and mounting the fs again, you can observe that end of\n\u0027ocfs2_file\u0027 has lost its contents.\n\nFix the problem by not doing the pointless zeroing during conversion\nfrom inline format similarly as in the standard write path.\n\n[akpm@linux-foundation.org: fix whitespace, per Joseph]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47460",
"url": "https://www.suse.com/security/cve/CVE-2021-47460"
},
{
"category": "external",
"summary": "SUSE Bug 1225251 for CVE-2021-47460",
"url": "https://bugzilla.suse.com/1225251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47460"
},
{
"cve": "CVE-2021-47469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47469"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47469",
"url": "https://www.suse.com/security/cve/CVE-2021-47469"
},
{
"category": "external",
"summary": "SUSE Bug 1225347 for CVE-2021-47469",
"url": "https://bugzilla.suse.com/1225347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47469"
},
{
"cve": "CVE-2021-47472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47472"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47472",
"url": "https://www.suse.com/security/cve/CVE-2021-47472"
},
{
"category": "external",
"summary": "SUSE Bug 1225189 for CVE-2021-47472",
"url": "https://bugzilla.suse.com/1225189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47472"
},
{
"cve": "CVE-2021-47473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47473"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()\n\nCommit 8c0eb596baa5 (\"[SCSI] qla2xxx: Fix a memory leak in an error path of\nqla2x00_process_els()\"), intended to change:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_HST_ELS_NOLOGIN\n\n\n bsg_job-\u003erequest-\u003emsgcode != FC_BSG_RPT_ELS\n\nbut changed it to:\n\n bsg_job-\u003erequest-\u003emsgcode == FC_BSG_RPT_ELS\n\ninstead.\n\nChange the == to a != to avoid leaking the fcport structure or freeing\nunallocated memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47473",
"url": "https://www.suse.com/security/cve/CVE-2021-47473"
},
{
"category": "external",
"summary": "SUSE Bug 1225192 for CVE-2021-47473",
"url": "https://bugzilla.suse.com/1225192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2021-47473"
},
{
"cve": "CVE-2021-47478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47478"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Fix out of bound access for corrupted isofs image\n\nWhen isofs image is suitably corrupted isofs_read_inode() can read data\nbeyond the end of buffer. Sanity-check the directory entry length before\nusing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47478",
"url": "https://www.suse.com/security/cve/CVE-2021-47478"
},
{
"category": "external",
"summary": "SUSE Bug 1225198 for CVE-2021-47478",
"url": "https://bugzilla.suse.com/1225198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47478"
},
{
"cve": "CVE-2021-47480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47480"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Put LLD module refcnt after SCSI device is released\n\nSCSI host release is triggered when SCSI device is freed. We have to make\nsure that the low-level device driver module won\u0027t be unloaded before SCSI\nhost instance is released because shost-\u003ehostt is required in the release\nhandler.\n\nMake sure to put LLD module refcnt after SCSI device is released.\n\nFixes a kernel panic of \u0027BUG: unable to handle page fault for address\u0027\nreported by Changhui and Yi.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47480",
"url": "https://www.suse.com/security/cve/CVE-2021-47480"
},
{
"category": "external",
"summary": "SUSE Bug 1225322 for CVE-2021-47480",
"url": "https://bugzilla.suse.com/1225322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47480"
},
{
"cve": "CVE-2021-47483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47483"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix possible double-free in regcache_rbtree_exit()\n\nIn regcache_rbtree_insert_to_block(), when \u0027present\u0027 realloc failed,\nthe \u0027blk\u0027 which is supposed to assign to \u0027rbnode-\u003eblock\u0027 will be freed,\nso \u0027rbnode-\u003eblock\u0027 points a freed memory, in the error handling path of\nregcache_rbtree_init(), \u0027rbnode-\u003eblock\u0027 will be freed again in\nregcache_rbtree_exit(), KASAN will report double-free as follows:\n\nBUG: KASAN: double-free or invalid-free in kfree+0xce/0x390\nCall Trace:\n slab_free_freelist_hook+0x10d/0x240\n kfree+0xce/0x390\n regcache_rbtree_exit+0x15d/0x1a0\n regcache_rbtree_init+0x224/0x2c0\n regcache_init+0x88d/0x1310\n __regmap_init+0x3151/0x4a80\n __devm_regmap_init+0x7d/0x100\n madera_spi_probe+0x10f/0x333 [madera_spi]\n spi_probe+0x183/0x210\n really_probe+0x285/0xc30\n\nTo fix this, moving up the assignment of rbnode-\u003eblock to immediately after\nthe reallocation has succeeded so that the data structure stays valid even\nif the second reallocation fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47483",
"url": "https://www.suse.com/security/cve/CVE-2021-47483"
},
{
"category": "external",
"summary": "SUSE Bug 1224907 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224907"
},
{
"category": "external",
"summary": "SUSE Bug 1224908 for CVE-2021-47483",
"url": "https://bugzilla.suse.com/1224908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47483"
},
{
"cve": "CVE-2021-47485",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47485"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47485",
"url": "https://www.suse.com/security/cve/CVE-2021-47485"
},
{
"category": "external",
"summary": "SUSE Bug 1224904 for CVE-2021-47485",
"url": "https://bugzilla.suse.com/1224904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47485"
},
{
"cve": "CVE-2021-47495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47495"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47495",
"url": "https://www.suse.com/security/cve/CVE-2021-47495"
},
{
"category": "external",
"summary": "SUSE Bug 1225351 for CVE-2021-47495",
"url": "https://bugzilla.suse.com/1225351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47495"
},
{
"cve": "CVE-2021-47496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47496"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix flipped sign in tls_err_abort() calls\n\nsk-\u003esk_err appears to expect a positive value, a convention that ktls\ndoesn\u0027t always follow and that leads to memory corruption in other code.\nFor instance,\n\n [kworker]\n tls_encrypt_done(..., err=\u003cnegative error from crypto request\u003e)\n tls_err_abort(.., err)\n sk-\u003esk_err = err;\n\n [task]\n splice_from_pipe_feed\n ...\n tls_sw_do_sendpage\n if (sk-\u003esk_err) {\n ret = -sk-\u003esk_err; // ret is positive\n\n splice_from_pipe_feed (continued)\n ret = actor(...) // ret is still positive and interpreted as bytes\n // written, resulting in underflow of buf-\u003elen and\n // sd-\u003elen, leading to huge buf-\u003eoffset and bogus\n // addresses computed in later calls to actor()\n\nFix all tls_err_abort() callers to pass a negative error code\nconsistently and centralize the error-prone sign flip there, throwing in\na warning to catch future misuse and uninlining the function so it\nreally does only warn once.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47496",
"url": "https://www.suse.com/security/cve/CVE-2021-47496"
},
{
"category": "external",
"summary": "SUSE Bug 1225354 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1225354"
},
{
"category": "external",
"summary": "SUSE Bug 1227656 for CVE-2021-47496",
"url": "https://bugzilla.suse.com/1227656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47496"
},
{
"cve": "CVE-2021-47497",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47497"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47497",
"url": "https://www.suse.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "SUSE Bug 1225355 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1225355"
},
{
"category": "external",
"summary": "SUSE Bug 1227655 for CVE-2021-47497",
"url": "https://bugzilla.suse.com/1227655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47497"
},
{
"cve": "CVE-2021-47500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: mma8452: Fix trigger reference couting\n\nThe mma8452 driver directly assigns a trigger to the struct iio_dev. The\nIIO core when done using this trigger will call `iio_trigger_put()` to drop\nthe reference count by 1.\n\nWithout the matching `iio_trigger_get()` in the driver the reference count\ncan reach 0 too early, the trigger gets freed while still in use and a\nuse-after-free occurs.\n\nFix this by getting a reference to the trigger before assigning it to the\nIIO device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47500",
"url": "https://www.suse.com/security/cve/CVE-2021-47500"
},
{
"category": "external",
"summary": "SUSE Bug 1225360 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1225360"
},
{
"category": "external",
"summary": "SUSE Bug 1227698 for CVE-2021-47500",
"url": "https://bugzilla.suse.com/1227698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47500"
},
{
"cve": "CVE-2021-47506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47506"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix use-after-free due to delegation race\n\nA delegation break could arrive as soon as we\u0027ve called vfs_setlease. A\ndelegation break runs a callback which immediately (in\nnfsd4_cb_recall_prepare) adds the delegation to del_recall_lru. If we\nthen exit nfs4_set_delegation without hashing the delegation, it will be\nfreed as soon as the callback is done with it, without ever being\nremoved from del_recall_lru.\n\nSymptoms show up later as use-after-free or list corruption warnings,\nusually in the laundromat thread.\n\nI suspect aba2072f4523 \"nfsd: grant read delegations to clients holding\nwrites\" made this bug easier to hit, but I looked as far back as v3.0\nand it looks to me it already had the same problem. So I\u0027m not sure\nwhere the bug was introduced; it may have been there from the beginning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47506",
"url": "https://www.suse.com/security/cve/CVE-2021-47506"
},
{
"category": "external",
"summary": "SUSE Bug 1225404 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1225404"
},
{
"category": "external",
"summary": "SUSE Bug 1227497 for CVE-2021-47506",
"url": "https://bugzilla.suse.com/1227497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47506"
},
{
"cve": "CVE-2021-47509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47509"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Limit the period size to 16MB\n\nSet the practical limit to the period size (the fragment shift in OSS)\ninstead of a full 31bit; a too large value could lead to the exhaust\nof memory as we allocate temporary buffers of the period size, too.\n\nAs of this patch, we set to 16MB limit, which should cover all use\ncases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47509",
"url": "https://www.suse.com/security/cve/CVE-2021-47509"
},
{
"category": "external",
"summary": "SUSE Bug 1225409 for CVE-2021-47509",
"url": "https://bugzilla.suse.com/1225409"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47509"
},
{
"cve": "CVE-2021-47511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47511"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t. Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47511",
"url": "https://www.suse.com/security/cve/CVE-2021-47511"
},
{
"category": "external",
"summary": "SUSE Bug 1225411 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1225411"
},
{
"category": "external",
"summary": "SUSE Bug 1227700 for CVE-2021-47511",
"url": "https://bugzilla.suse.com/1227700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47511"
},
{
"cve": "CVE-2021-47523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47523"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr\n\nThis buffer is currently allocated in hfi1_init():\n\n\tif (reinit)\n\t\tret = init_after_reset(dd);\n\telse\n\t\tret = loadtime_init(dd);\n\tif (ret)\n\t\tgoto done;\n\n\t/* allocate dummy tail memory for all receive contexts */\n\tdd-\u003ercvhdrtail_dummy_kvaddr = dma_alloc_coherent(\u0026dd-\u003epcidev-\u003edev,\n\t\t\t\t\t\t\t sizeof(u64),\n\t\t\t\t\t\t\t \u0026dd-\u003ercvhdrtail_dummy_dma,\n\t\t\t\t\t\t\t GFP_KERNEL);\n\n\tif (!dd-\u003ercvhdrtail_dummy_kvaddr) {\n\t\tdd_dev_err(dd, \"cannot allocate dummy tail memory\\n\");\n\t\tret = -ENOMEM;\n\t\tgoto done;\n\t}\n\nThe reinit triggered path will overwrite the old allocation and leak it.\n\nFix by moving the allocation to hfi1_alloc_devdata() and the deallocation\nto hfi1_free_devdata().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47523",
"url": "https://www.suse.com/security/cve/CVE-2021-47523"
},
{
"category": "external",
"summary": "SUSE Bug 1225438 for CVE-2021-47523",
"url": "https://bugzilla.suse.com/1225438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47523"
},
{
"cve": "CVE-2021-47541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()\n\nIn mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and\ntmp-\u003etx_cq will be freed on the error path of mlx4_en_copy_priv().\nAfter that mlx4_en_alloc_resources() is called and there is a dereference\nof \u0026tmp-\u003etx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to\na use after free problem on failure of mlx4_en_copy_priv().\n\nFix this bug by adding a check of mlx4_en_copy_priv()\n\nThis bug was found by a static analyzer. The analysis employs\ndifferential checking to identify inconsistent security operations\n(e.g., checks or kfrees) between two code paths and confirms that the\ninconsistent operations are not recovered in the current function or\nthe callers, so they constitute bugs.\n\nNote that, as a bug found by static analysis, it can be a false\npositive or hard to trigger. Multiple researchers have cross-reviewed\nthe bug.\n\nBuilds with CONFIG_MLX4_EN=m show no new warnings,\nand our static analyzer no longer warns about this code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47541",
"url": "https://www.suse.com/security/cve/CVE-2021-47541"
},
{
"category": "external",
"summary": "SUSE Bug 1225453 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225453"
},
{
"category": "external",
"summary": "SUSE Bug 1225454 for CVE-2021-47541",
"url": "https://bugzilla.suse.com/1225454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2021-47541"
},
{
"cve": "CVE-2021-47548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47548"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n if (port \u003e= DSAF_GE_NUM)\n return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n port_rst_off = dsaf_dev-\u003emac_cb[port]-\u003eport_rst_off;\n\nbecause the length of dsaf_dev-\u003emac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47548",
"url": "https://www.suse.com/security/cve/CVE-2021-47548"
},
{
"category": "external",
"summary": "SUSE Bug 1225506 for CVE-2021-47548",
"url": "https://bugzilla.suse.com/1225506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47565"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost\u0027s sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47565",
"url": "https://www.suse.com/security/cve/CVE-2021-47565"
},
{
"category": "external",
"summary": "SUSE Bug 1225384 for CVE-2021-47565",
"url": "https://bugzilla.suse.com/1225384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-47565"
},
{
"cve": "CVE-2022-48636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup\n\nFix Oops in dasd_alias_get_start_dev() function caused by the pavgroup\npointer being NULL.\n\nThe pavgroup pointer is checked on the entrance of the function but\nwithout the lcu-\u003elock being held. Therefore there is a race window\nbetween dasd_alias_get_start_dev() and _lcu_update() which sets\npavgroup to NULL with the lcu-\u003elock held.\n\nFix by checking the pavgroup pointer with lcu-\u003elock held.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48636",
"url": "https://www.suse.com/security/cve/CVE-2022-48636"
},
{
"category": "external",
"summary": "SUSE Bug 1223512 for CVE-2022-48636",
"url": "https://bugzilla.suse.com/1223512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48636"
},
{
"cve": "CVE-2022-48650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48650"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48650",
"url": "https://www.suse.com/security/cve/CVE-2022-48650"
},
{
"category": "external",
"summary": "SUSE Bug 1223509 for CVE-2022-48650",
"url": "https://bugzilla.suse.com/1223509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48650"
},
{
"cve": "CVE-2022-48672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48672"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48672",
"url": "https://www.suse.com/security/cve/CVE-2022-48672"
},
{
"category": "external",
"summary": "SUSE Bug 1223931 for CVE-2022-48672",
"url": "https://bugzilla.suse.com/1223931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48672"
},
{
"cve": "CVE-2022-48686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48686",
"url": "https://www.suse.com/security/cve/CVE-2022-48686"
},
{
"category": "external",
"summary": "SUSE Bug 1223948 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1223948"
},
{
"category": "external",
"summary": "SUSE Bug 1226337 for CVE-2022-48686",
"url": "https://bugzilla.suse.com/1226337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2022-48686"
},
{
"cve": "CVE-2022-48697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48697"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a use-after-free\n\nFix the following use-after-free complaint triggered by blktests nvme/004:\n\nBUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350\nRead of size 4 at addr 0000607bd1835943 by task kworker/13:1/460\nWorkqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]\nCall Trace:\n show_stack+0x52/0x58\n dump_stack_lvl+0x49/0x5e\n print_report.cold+0x36/0x1e2\n kasan_report+0xb9/0xf0\n __asan_load4+0x6b/0x80\n blk_mq_complete_request_remote+0xac/0x350\n nvme_loop_queue_response+0x1df/0x275 [nvme_loop]\n __nvmet_req_complete+0x132/0x4f0 [nvmet]\n nvmet_req_complete+0x15/0x40 [nvmet]\n nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]\n nvme_loop_execute_work+0x20/0x30 [nvme_loop]\n process_one_work+0x56e/0xa70\n worker_thread+0x2d1/0x640\n kthread+0x183/0x1c0\n ret_from_fork+0x1f/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48697",
"url": "https://www.suse.com/security/cve/CVE-2022-48697"
},
{
"category": "external",
"summary": "SUSE Bug 1223922 for CVE-2022-48697",
"url": "https://bugzilla.suse.com/1223922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48697"
},
{
"cve": "CVE-2022-48702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48702"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48702",
"url": "https://www.suse.com/security/cve/CVE-2022-48702"
},
{
"category": "external",
"summary": "SUSE Bug 1223923 for CVE-2022-48702",
"url": "https://bugzilla.suse.com/1223923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48702"
},
{
"cve": "CVE-2022-48704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48704"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: add a force flush to delay work when radeon\n\nAlthough radeon card fence and wait for gpu to finish processing current batch rings,\nthere is still a corner case that radeon lockup work queue may not be fully flushed,\nand meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to\nput device in D3hot state.\nPer PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.\n\u003e Configuration and Message requests are the only TLPs accepted by a Function in\n\u003e the D3hot state. All other received Requests must be handled as Unsupported Requests,\n\u003e and all received Completions may optionally be handled as Unexpected Completions.\nThis issue will happen in following logs:\nUnable to handle kernel paging request at virtual address 00008800e0008010\nCPU 0 kworker/0:3(131): Oops 0\npc = [\u003cffffffff811bea5c\u003e] ra = [\u003cffffffff81240844\u003e] ps = 0000 Tainted: G W\npc is at si_gpu_check_soft_reset+0x3c/0x240\nra is at si_dma_is_lockup+0x34/0xd0\nv0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000\nt2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258\nt5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000\ns0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018\ns3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000\ns6 = fff00007ef07bd98\na0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008\na3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338\nt8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800\nt11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000\ngp = ffffffff81d89690 sp = 00000000aa814126\nDisabling lock debugging due to kernel taint\nTrace:\n[\u003cffffffff81240844\u003e] si_dma_is_lockup+0x34/0xd0\n[\u003cffffffff81119610\u003e] radeon_fence_check_lockup+0xd0/0x290\n[\u003cffffffff80977010\u003e] process_one_work+0x280/0x550\n[\u003cffffffff80977350\u003e] worker_thread+0x70/0x7c0\n[\u003cffffffff80977410\u003e] worker_thread+0x130/0x7c0\n[\u003cffffffff80982040\u003e] kthread+0x200/0x210\n[\u003cffffffff809772e0\u003e] worker_thread+0x0/0x7c0\n[\u003cffffffff80981f8c\u003e] kthread+0x14c/0x210\n[\u003cffffffff80911658\u003e] ret_from_kernel_thread+0x18/0x20\n[\u003cffffffff80981e40\u003e] kthread+0x0/0x210\n Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101\n \u003c88210000\u003e 4821ed21\nSo force lockup work queue flush to fix this problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48704",
"url": "https://www.suse.com/security/cve/CVE-2022-48704"
},
{
"category": "external",
"summary": "SUSE Bug 1223932 for CVE-2022-48704",
"url": "https://bugzilla.suse.com/1223932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48704"
},
{
"cve": "CVE-2022-48708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48708"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: single: fix potential NULL dereference\n\nAdded checking of pointer \"function\" in pcs_set_mux().\npinmux_generic_get_function() can return NULL and the pointer\n\"function\" was dereferenced without checking against NULL.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48708",
"url": "https://www.suse.com/security/cve/CVE-2022-48708"
},
{
"category": "external",
"summary": "SUSE Bug 1224942 for CVE-2022-48708",
"url": "https://bugzilla.suse.com/1224942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48708"
},
{
"cve": "CVE-2022-48710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix a possible null pointer dereference\n\nIn radeon_fp_native_mode(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.\n\nThe failure status of drm_cvt_mode() on the other path is checked too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48710",
"url": "https://www.suse.com/security/cve/CVE-2022-48710"
},
{
"category": "external",
"summary": "SUSE Bug 1225230 for CVE-2022-48710",
"url": "https://bugzilla.suse.com/1225230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2022-48710"
},
{
"cve": "CVE-2023-0160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0160"
}
],
"notes": [
{
"category": "general",
"text": "A deadlock flaw was found in the Linux kernel\u0027s BPF subsystem. This flaw allows a local user to potentially crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0160",
"url": "https://www.suse.com/security/cve/CVE-2023-0160"
},
{
"category": "external",
"summary": "SUSE Bug 1209657 for CVE-2023-0160",
"url": "https://bugzilla.suse.com/1209657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-0160"
},
{
"cve": "CVE-2023-1829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1829"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1829",
"url": "https://www.suse.com/security/cve/CVE-2023-1829"
},
{
"category": "external",
"summary": "SUSE Bug 1210335 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210335"
},
{
"category": "external",
"summary": "SUSE Bug 1210619 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1210619"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1220886 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1220886"
},
{
"category": "external",
"summary": "SUSE Bug 1228311 for CVE-2023-1829",
"url": "https://bugzilla.suse.com/1228311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2023-1829"
},
{
"cve": "CVE-2023-42755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42755"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42755",
"url": "https://www.suse.com/security/cve/CVE-2023-42755"
},
{
"category": "external",
"summary": "SUSE Bug 1215702 for CVE-2023-42755",
"url": "https://bugzilla.suse.com/1215702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-47233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-47233"
}
],
"notes": [
{
"category": "general",
"text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-47233",
"url": "https://www.suse.com/security/cve/CVE-2023-47233"
},
{
"category": "external",
"summary": "SUSE Bug 1216702 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1216702"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2023-47233",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-52527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don\u0027t want to repeat the\ntransport header or account for it twice. This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff. The warning occurs when \u0027copy\u0027 is larger than\nthe amount of data in the message iterator. This is because the requested\nlength includes the transport header length when it shouldn\u0027t. This can be\ntriggered by, for example:\n\n sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n bind(sfd, ...); // ::1\n connect(sfd, ...); // ::1 port 7\n send(sfd, buffer, 4100, MSG_MORE);\n sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won\u0027t suffer from this problem as it builds\nthe UDP packet itself.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52527",
"url": "https://www.suse.com/security/cve/CVE-2023-52527"
},
{
"category": "external",
"summary": "SUSE Bug 1220928 for CVE-2023-52527",
"url": "https://bugzilla.suse.com/1220928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52586"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n parameter of dpu_encoder_phys.\n -Switch from atomic refcnt to a simple int counter as mutex has\n now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52586",
"url": "https://www.suse.com/security/cve/CVE-2023-52586"
},
{
"category": "external",
"summary": "SUSE Bug 1221081 for CVE-2023-52586",
"url": "https://bugzilla.suse.com/1221081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52591"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52591",
"url": "https://www.suse.com/security/cve/CVE-2023-52591"
},
{
"category": "external",
"summary": "SUSE Bug 1221044 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221044"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-52591",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52646"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naio: fix mremap after fork null-deref\n\nCommit e4a0d3e720e7 (\"aio: Make it possible to remap aio ring\") introduced\na null-deref if mremap is called on an old aio mapping after fork as\nmm-\u003eioctx_table will be set to NULL.\n\n[jmoyer@redhat.com: fix 80 column issue]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52646",
"url": "https://www.suse.com/security/cve/CVE-2023-52646"
},
{
"category": "external",
"summary": "SUSE Bug 1223432 for CVE-2023-52646",
"url": "https://bugzilla.suse.com/1223432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52653"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx-\u003emech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52653",
"url": "https://www.suse.com/security/cve/CVE-2023-52653"
},
{
"category": "external",
"summary": "SUSE Bug 1223712 for CVE-2023-52653",
"url": "https://bugzilla.suse.com/1223712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52655"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aqc111: check packet for fixup for true limit\n\nIf a device sends a packet that is inbetween 0\nand sizeof(u64) the value passed to skb_trim()\nas length will wrap around ending up as some very\nlarge value.\n\nThe driver will then proceed to parse the header\nlocated at that position, which will either oops or\nprocess some random value.\n\nThe fix is to check against sizeof(u64) rather than\n0, which the driver currently does. The issue exists\nsince the introduction of the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52655",
"url": "https://www.suse.com/security/cve/CVE-2023-52655"
},
{
"category": "external",
"summary": "SUSE Bug 1217169 for CVE-2023-52655",
"url": "https://bugzilla.suse.com/1217169"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52664"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52664",
"url": "https://www.suse.com/security/cve/CVE-2023-52664"
},
{
"category": "external",
"summary": "SUSE Bug 1224747 for CVE-2023-52664",
"url": "https://bugzilla.suse.com/1224747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52685"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52685",
"url": "https://www.suse.com/security/cve/CVE-2023-52685"
},
{
"category": "external",
"summary": "SUSE Bug 1224728 for CVE-2023-52685",
"url": "https://bugzilla.suse.com/1224728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52686"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52686",
"url": "https://www.suse.com/security/cve/CVE-2023-52686"
},
{
"category": "external",
"summary": "SUSE Bug 1224682 for CVE-2023-52686",
"url": "https://bugzilla.suse.com/1224682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52691"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix a double-free in si_dpm_init\n\nWhen the allocation of\nadev-\u003epm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,\namdgpu_free_extended_power_table is called to free some fields of adev.\nHowever, when the control flow returns to si_dpm_sw_init, it goes to\nlabel dpm_failed and calls si_dpm_fini, which calls\namdgpu_free_extended_power_table again and free those fields again. Thus\na double-free is triggered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52691",
"url": "https://www.suse.com/security/cve/CVE-2023-52691"
},
{
"category": "external",
"summary": "SUSE Bug 1224607 for CVE-2023-52691",
"url": "https://bugzilla.suse.com/1224607"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52696"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_powercap_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52696",
"url": "https://www.suse.com/security/cve/CVE-2023-52696"
},
{
"category": "external",
"summary": "SUSE Bug 1224601 for CVE-2023-52696",
"url": "https://bugzilla.suse.com/1224601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52698"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: fix memory leak in netlbl_calipso_add_pass()\n\nIf IPv6 support is disabled at boot (ipv6.disable=1),\nthe calipso_init() -\u003e netlbl_calipso_ops_register() function isn\u0027t called,\nand the netlbl_calipso_ops_get() function always returns NULL.\nIn this case, the netlbl_calipso_add_pass() function allocates memory\nfor the doi_def variable but doesn\u0027t free it with the calipso_doi_free().\n\nBUG: memory leak\nunreferenced object 0xffff888011d68180 (size 64):\n comm \"syz-executor.1\", pid 10746, jiffies 4295410986 (age 17.928s)\n hex dump (first 32 bytes):\n 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c...\u003e] kmalloc include/linux/slab.h:552 [inline]\n [\u003c...\u003e] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]\n [\u003c...\u003e] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111\n [\u003c...\u003e] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739\n [\u003c...\u003e] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]\n [\u003c...\u003e] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800\n [\u003c...\u003e] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515\n [\u003c...\u003e] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811\n [\u003c...\u003e] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n [\u003c...\u003e] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339\n [\u003c...\u003e] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934\n [\u003c...\u003e] sock_sendmsg_nosec net/socket.c:651 [inline]\n [\u003c...\u003e] sock_sendmsg+0x157/0x190 net/socket.c:671\n [\u003c...\u003e] ____sys_sendmsg+0x712/0x870 net/socket.c:2342\n [\u003c...\u003e] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396\n [\u003c...\u003e] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429\n [\u003c...\u003e] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46\n [\u003c...\u003e] entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with Syzkaller\n\n[PM: merged via the LSM tree at Jakub Kicinski request]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52698",
"url": "https://www.suse.com/security/cve/CVE-2023-52698"
},
{
"category": "external",
"summary": "SUSE Bug 1224621 for CVE-2023-52698",
"url": "https://bugzilla.suse.com/1224621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52703"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don\u0027t pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it\u0027s pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let\u0027s just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52703",
"url": "https://www.suse.com/security/cve/CVE-2023-52703"
},
{
"category": "external",
"summary": "SUSE Bug 1225549 for CVE-2023-52703",
"url": "https://bugzilla.suse.com/1225549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won\u0027t call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of \u0027card-\u003edev\u0027 is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n hex dump (first 32 bytes):\n 00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff ..o.....`X......\n 10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff .@Q......@Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c000000002f839ccb\u003e] mmc_alloc_card+0x38/0xb0 [mmc_core]\n [\u003c0000000004adcbf6\u003e] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n [\u003c000000007538fea0\u003e] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n hex dump (first 32 bytes):\n 00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff .@Q......X......\n 10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff ..Q.......Q.....\n backtrace:\n [\u003c000000009e5931da\u003e] kmalloc_trace+0x21/0x110\n [\u003c00000000fcbe706c\u003e] sdio_alloc_func+0x35/0x100 [mmc_core]\n [\u003c00000000c68f4b50\u003e] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n [\u003c00000000d4fdeba7\u003e] mmc_rescan+0x54a/0x640 [mmc_core]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52730",
"url": "https://www.suse.com/security/cve/CVE-2023-52730"
},
{
"category": "external",
"summary": "SUSE Bug 1224956 for CVE-2023-52730",
"url": "https://bugzilla.suse.com/1224956"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: blocklist the kclient when receiving corrupted snap trace\n\nWhen received corrupted snap trace we don\u0027t know what exactly has\nhappened in MDS side. And we shouldn\u0027t continue IOs and metadatas\naccess to MDS, which may corrupt or get incorrect contents.\n\nThis patch will just block all the further IO/MDS requests\nimmediately and then evict the kclient itself.\n\nThe reason why we still need to evict the kclient just after\nblocking all the further IOs is that the MDS could revoke the caps\nfaster.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52732",
"url": "https://www.suse.com/security/cve/CVE-2023-52732"
},
{
"category": "external",
"summary": "SUSE Bug 1225222 for CVE-2023-52732",
"url": "https://bugzilla.suse.com/1225222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52741"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix use-after-free in rdata-\u003eread_into_pages()\n\nWhen the network status is unstable, use-after-free may occur when\nread data from the server.\n\n BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0\n\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x38/0x4c\n print_report+0x16f/0x4a6\n kasan_report+0xb7/0x130\n readpages_fill_pages+0x14c/0x7e0\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n \u003c/TASK\u003e\n\n Allocated by task 2535:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x82/0x90\n cifs_readdata_direct_alloc+0x2c/0x110\n cifs_readdata_alloc+0x2d/0x60\n cifs_readahead+0x393/0xfe0\n read_pages+0x12f/0x470\n page_cache_ra_unbounded+0x1b1/0x240\n filemap_get_pages+0x1c8/0x9a0\n filemap_read+0x1c0/0x540\n cifs_strict_readv+0x21b/0x240\n vfs_read+0x395/0x4b0\n ksys_read+0xb8/0x150\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 79:\n kasan_save_stack+0x22/0x50\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2e/0x50\n __kasan_slab_free+0x10e/0x1a0\n __kmem_cache_free+0x7a/0x1a0\n cifs_readdata_release+0x49/0x60\n process_one_work+0x46c/0x760\n worker_thread+0x2a4/0x6f0\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\n Last potentially related work creation:\n kasan_save_stack+0x22/0x50\n __kasan_record_aux_stack+0x95/0xb0\n insert_work+0x2b/0x130\n __queue_work+0x1fe/0x660\n queue_work_on+0x4b/0x60\n smb2_readv_callback+0x396/0x800\n cifs_abort_connection+0x474/0x6a0\n cifs_reconnect+0x5cb/0xa50\n cifs_readv_from_socket.cold+0x22/0x6c\n cifs_read_page_from_socket+0xc1/0x100\n readpages_fill_pages.cold+0x2f/0x46\n cifs_readv_receive+0x46d/0xa40\n cifs_demultiplex_thread+0x121c/0x1490\n kthread+0x16b/0x1a0\n ret_from_fork+0x2c/0x50\n\nThe following function calls will cause UAF of the rdata pointer.\n\nreadpages_fill_pages\n cifs_read_page_from_socket\n cifs_readv_from_socket\n cifs_reconnect\n __cifs_reconnect\n cifs_abort_connection\n mid-\u003ecallback() --\u003e smb2_readv_callback\n queue_work(\u0026rdata-\u003ework) # if the worker completes first,\n # the rdata is freed\n cifs_readv_complete\n kref_put\n cifs_readdata_release\n kfree(rdata)\n return rdata-\u003e... # UAF in readpages_fill_pages()\n\nSimilarly, this problem also occurs in the uncache_fill_pages().\n\nFix this by adjusts the order of condition judgment in the return\nstatement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52741",
"url": "https://www.suse.com/security/cve/CVE-2023-52741"
},
{
"category": "external",
"summary": "SUSE Bug 1225479 for CVE-2023-52741",
"url": "https://bugzilla.suse.com/1225479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52742"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: USB: Fix wrong-direction WARNING in plusb.c\n\nThe syzbot fuzzer detected a bug in the plusb network driver: A\nzero-length control-OUT transfer was treated as a read instead of a\nwrite. In modern kernels this error provokes a WARNING:\n\nusb 1-1: BOGUS control dir, pipe 80000280 doesn\u0027t match bRequestType c0\nWARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411\nusb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 1 PID: 4645 Comm: dhcpcd Not tainted\n6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n01/12/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010\n usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068\n pl_vendor_req drivers/net/usb/plusb.c:60 [inline]\n pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]\n pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85\n usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889\n __dev_open+0x297/0x4d0 net/core/dev.c:1417\n __dev_change_flags+0x587/0x750 net/core/dev.c:8530\n dev_change_flags+0x97/0x170 net/core/dev.c:8602\n devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147\n inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979\n sock_do_ioctl+0xcc/0x230 net/socket.c:1169\n sock_ioctl+0x1f8/0x680 net/socket.c:1286\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and\nremove the USB_DIR_IN flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52742",
"url": "https://www.suse.com/security/cve/CVE-2023-52742"
},
{
"category": "external",
"summary": "SUSE Bug 1225482 for CVE-2023-52742",
"url": "https://bugzilla.suse.com/1225482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Restore allocated resources on failed copyout\n\nFix a resource leak if an error occurs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52747",
"url": "https://www.suse.com/security/cve/CVE-2023-52747"
},
{
"category": "external",
"summary": "SUSE Bug 1224931 for CVE-2023-52747",
"url": "https://bugzilla.suse.com/1224931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52759"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52759",
"url": "https://www.suse.com/security/cve/CVE-2023-52759"
},
{
"category": "external",
"summary": "SUSE Bug 1225560 for CVE-2023-52759",
"url": "https://bugzilla.suse.com/1225560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52774"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: protect device queue against concurrent access\n\nIn dasd_profile_start() the amount of requests on the device queue are\ncounted. The access to the device queue is unprotected against\nconcurrent access. With a lot of parallel I/O, especially with alias\ndevices enabled, the device queue can change while dasd_profile_start()\nis accessing the queue. In the worst case this leads to a kernel panic\ndue to incorrect pointer accesses.\n\nFix this by taking the device lock before accessing the queue and\ncounting the requests. Additionally the check for a valid profile data\npointer can be done earlier to avoid unnecessary locking in a hot path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52774",
"url": "https://www.suse.com/security/cve/CVE-2023-52774"
},
{
"category": "external",
"summary": "SUSE Bug 1225572 for CVE-2023-52774",
"url": "https://bugzilla.suse.com/1225572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52781"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52781",
"url": "https://www.suse.com/security/cve/CVE-2023-52781"
},
{
"category": "external",
"summary": "SUSE Bug 1225092 for CVE-2023-52781",
"url": "https://bugzilla.suse.com/1225092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52796"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 \u003c41\u003e 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\u003c#DF\u003e\n\u003c/#DF\u003e\n\u003cTASK\u003e\n[\u003cffffffff81f281d1\u003e] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[\u003cffffffff817e5bf2\u003e] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[\u003cffffffff817e5bf2\u003e] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[\u003cffffffff817e5bf2\u003e] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[\u003cffffffff817e5bf2\u003e] cpu_online include/linux/cpumask.h:1092 [inline]\n[\u003cffffffff817e5bf2\u003e] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[\u003cffffffff817e5bf2\u003e] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[\u003cffffffff8563221e\u003e] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[\u003cffffffff8561464d\u003e] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[\u003cffffffff8561464d\u003e] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[\u003cffffffff85618120\u003e] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[\u003cffffffff856f65b5\u003e] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[\u003cffffffff856f65b5\u003e] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[\u003cffffffff85618009\u003e] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[\u003cffffffff8561821a\u003e] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[\u003cffffffff838bd5a3\u003e] ip6_route_output include/net/ip6_route.h:100 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[\u003cffffffff838bd5a3\u003e] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[\u003cffffffff838c2909\u003e] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[\u003cffffffff84d03900\u003e] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[\u003cffffffff84d03900\u003e] xmit_one net/core/dev.c:3644 [inline]\n[\u003cffffffff84d03900\u003e] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[\u003cffffffff84d080e2\u003e] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[\u003cffffffff855ce4cd\u003e] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[\u003cffffffff855ce4cd\u003e] neigh_hh_output include/net/neighbour.h:529 [inline]\n[\u003cf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52796",
"url": "https://www.suse.com/security/cve/CVE-2023-52796"
},
{
"category": "external",
"summary": "SUSE Bug 1224930 for CVE-2023-52796",
"url": "https://bugzilla.suse.com/1224930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[ 250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[ 250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[ 250.500549] Workqueue: events rpc_free_client_work\n[ 250.501001] Call Trace:\n[ 250.502880] kasan_report+0xb6/0xf0\n[ 250.503209] ? dget_parent+0x195/0x200\n[ 250.503561] dget_parent+0x195/0x200\n[ 250.503897] ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[ 250.504384] rpc_rmdir_depopulate+0x1b/0x90\n[ 250.504781] rpc_remove_client_dir+0xf5/0x150\n[ 250.505195] rpc_free_client_work+0xe4/0x230\n[ 250.505598] process_one_work+0x8ee/0x13b0\n...\n[ 22.039056] Allocated by task 244:\n[ 22.039390] kasan_save_stack+0x22/0x50\n[ 22.039758] kasan_set_track+0x25/0x30\n[ 22.040109] __kasan_slab_alloc+0x59/0x70\n[ 22.040487] kmem_cache_alloc_lru+0xf0/0x240\n[ 22.040889] __d_alloc+0x31/0x8e0\n[ 22.041207] d_alloc+0x44/0x1f0\n[ 22.041514] __rpc_lookup_create_exclusive+0x11c/0x140\n[ 22.041987] rpc_mkdir_populate.constprop.0+0x5f/0x110\n[ 22.042459] rpc_create_client_dir+0x34/0x150\n[ 22.042874] rpc_setup_pipedir_sb+0x102/0x1c0\n[ 22.043284] rpc_client_register+0x136/0x4e0\n[ 22.043689] rpc_new_client+0x911/0x1020\n[ 22.044057] rpc_create_xprt+0xcb/0x370\n[ 22.044417] rpc_create+0x36b/0x6c0\n...\n[ 22.049524] Freed by task 0:\n[ 22.049803] kasan_save_stack+0x22/0x50\n[ 22.050165] kasan_set_track+0x25/0x30\n[ 22.050520] kasan_save_free_info+0x2b/0x50\n[ 22.050921] __kasan_slab_free+0x10e/0x1a0\n[ 22.051306] kmem_cache_free+0xa5/0x390\n[ 22.051667] rcu_core+0x62c/0x1930\n[ 22.051995] __do_softirq+0x165/0x52a\n[ 22.052347]\n[ 22.052503] Last potentially related work creation:\n[ 22.052952] kasan_save_stack+0x22/0x50\n[ 22.053313] __kasan_record_aux_stack+0x8e/0xa0\n[ 22.053739] __call_rcu_common.constprop.0+0x6b/0x8b0\n[ 22.054209] dentry_free+0xb2/0x140\n[ 22.054540] __dentry_kill+0x3be/0x540\n[ 22.054900] shrink_dentry_list+0x199/0x510\n[ 22.055293] shrink_dcache_parent+0x190/0x240\n[ 22.055703] do_one_tree+0x11/0x40\n[ 22.056028] shrink_dcache_for_umount+0x61/0x140\n[ 22.056461] generic_shutdown_super+0x70/0x590\n[ 22.056879] kill_anon_super+0x3a/0x60\n[ 22.057234] rpc_kill_sb+0x121/0x200",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52803",
"url": "https://www.suse.com/security/cve/CVE-2023-52803"
},
{
"category": "external",
"summary": "SUSE Bug 1225008 for CVE-2023-52803",
"url": "https://bugzilla.suse.com/1225008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52821"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel: fix a possible null pointer dereference\n\nIn versatile_panel_get_modes(), the return value of drm_mode_duplicate()\nis assigned to mode, which will lead to a NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52821",
"url": "https://www.suse.com/security/cve/CVE-2023-52821"
},
{
"category": "external",
"summary": "SUSE Bug 1225022 for CVE-2023-52821",
"url": "https://bugzilla.suse.com/1225022"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52864",
"url": "https://www.suse.com/security/cve/CVE-2023-52864"
},
{
"category": "external",
"summary": "SUSE Bug 1225132 for CVE-2023-52864",
"url": "https://bugzilla.suse.com/1225132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52865",
"url": "https://www.suse.com/security/cve/CVE-2023-52865"
},
{
"category": "external",
"summary": "SUSE Bug 1225086 for CVE-2023-52865",
"url": "https://bugzilla.suse.com/1225086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52867"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer \u0027afmt_status\u0027 of size 6 could overflow, since index \u0027afmt_idx\u0027 is\nchecked after access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52867",
"url": "https://www.suse.com/security/cve/CVE-2023-52867"
},
{
"category": "external",
"summary": "SUSE Bug 1225009 for CVE-2023-52867",
"url": "https://bugzilla.suse.com/1225009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52875"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data\n\nAdd the check for the return value of mtk_alloc_clk_data() in order to\navoid NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52875",
"url": "https://www.suse.com/security/cve/CVE-2023-52875"
},
{
"category": "external",
"summary": "SUSE Bug 1225096 for CVE-2023-52875",
"url": "https://bugzilla.suse.com/1225096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52880",
"url": "https://www.suse.com/security/cve/CVE-2023-52880"
},
{
"category": "external",
"summary": "SUSE Bug 1222619 for CVE-2023-52880",
"url": "https://bugzilla.suse.com/1222619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2024-0639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0639"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0639",
"url": "https://www.suse.com/security/cve/CVE-2024-0639"
},
{
"category": "external",
"summary": "SUSE Bug 1218917 for CVE-2024-0639",
"url": "https://bugzilla.suse.com/1218917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-26625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26625"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk-\u003esk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock-\u003esk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock-\u003esk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n list_empty include/linux/list.h:373 [inline]\n waitqueue_active include/linux/wait.h:127 [inline]\n sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n skb_release_all net/core/skbuff.c:1092 [inline]\n napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n napi_poll net/core/dev.c:6645 [inline]\n net_rx_action+0x956/0xe90 net/core/dev.c:6778\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \u003c/TASK\u003e\n\nAllocated by task 5167:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3019 [inline]\n sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n alloc_inode+0x5d/0x220 fs/inode.c:260\n new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n sock_alloc+0x40/0x270 net/socket.c:634\n __sock_create+0xbc/0x800 net/socket.c:1535\n sock_create net/socket.c:1622 [inline]\n __sys_socket_create net/socket.c:1659 [inline]\n __sys_socket+0x14c/0x260 net/socket.c:1706\n __do_sys_socket net/socket.c:1720 [inline]\n __se_sys_socket net/socket.c:1718 [inline]\n __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n poison_slab_object mm/kasan/common.c:241 [inline]\n __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2121 [inlin\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26625",
"url": "https://www.suse.com/security/cve/CVE-2024-26625"
},
{
"category": "external",
"summary": "SUSE Bug 1221086 for CVE-2024-26625",
"url": "https://bugzilla.suse.com/1221086"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26739"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26739",
"url": "https://www.suse.com/security/cve/CVE-2024-26739"
},
{
"category": "external",
"summary": "SUSE Bug 1222559 for CVE-2024-26739",
"url": "https://bugzilla.suse.com/1222559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n ulen = len + skb_queue_empty(\u0026sk-\u003esk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26752",
"url": "https://www.suse.com/security/cve/CVE-2024-26752"
},
{
"category": "external",
"summary": "SUSE Bug 1222667 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1222667"
},
{
"category": "external",
"summary": "SUSE Bug 1223292 for CVE-2024-26752",
"url": "https://bugzilla.suse.com/1223292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26775"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (\u0026d-\u003elock).\nTo avoid possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n[1] lock(\u0026bdev-\u003ebd_size_lock);\n local_irq_disable();\n [2] lock(\u0026d-\u003elock);\n [3] lock(\u0026bdev-\u003ebd_size_lock);\n \u003cInterrupt\u003e\n[4] lock(\u0026d-\u003elock);\n\n *** DEADLOCK ***\n\nWhere [1](\u0026bdev-\u003ebd_size_lock) hold by zram_add()-\u003eset_capacity().\n[2]lock(\u0026d-\u003elock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](\u0026bdev-\u003ebd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(\u0026d-\u003elock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](\u0026d-\u003elock) -\u003e [3](\u0026bdev-\u003ebd_size_lock) by moving set_capacity()\noutside.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26775",
"url": "https://www.suse.com/security/cve/CVE-2024-26775"
},
{
"category": "external",
"summary": "SUSE Bug 1222627 for CVE-2024-26775",
"url": "https://bugzilla.suse.com/1222627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere\u0027s a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26791",
"url": "https://www.suse.com/security/cve/CVE-2024-26791"
},
{
"category": "external",
"summary": "SUSE Bug 1222793 for CVE-2024-26791",
"url": "https://bugzilla.suse.com/1222793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix underflow in parse_server_interfaces()\n\nIn this loop, we step through the buffer and after each item we check\nif the size_left is greater than the minimum size we need. However,\nthe problem is that \"bytes_left\" is type ssize_t while sizeof() is type\nsize_t. That means that because of type promotion, the comparison is\ndone as an unsigned and if we have negative bytes left the loop\ncontinues instead of ending.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26828",
"url": "https://www.suse.com/security/cve/CVE-2024-26828"
},
{
"category": "external",
"summary": "SUSE Bug 1223084 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223084"
},
{
"category": "external",
"summary": "SUSE Bug 1223363 for CVE-2024-26828",
"url": "https://bugzilla.suse.com/1223363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26846"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26846",
"url": "https://www.suse.com/security/cve/CVE-2024-26846"
},
{
"category": "external",
"summary": "SUSE Bug 1223023 for CVE-2024-26846",
"url": "https://bugzilla.suse.com/1223023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26874"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip\n\nIt\u0027s possible that mtk_crtc-\u003eevent is NULL in\nmtk_drm_crtc_finish_page_flip().\n\npending_needs_vblank value is set by mtk_crtc-\u003eevent, but in\nmtk_drm_crtc_atomic_flush(), it\u0027s is not guarded by the same\nlock in mtk_drm_finish_page_flip(), thus a race condition happens.\n\nConsider the following case:\n\nCPU1 CPU2\nstep 1:\nmtk_drm_crtc_atomic_begin()\nmtk_crtc-\u003eevent is not null,\n step 1:\n mtk_drm_crtc_atomic_flush:\n mtk_drm_crtc_update_config(\n !!mtk_crtc-\u003eevent)\nstep 2:\nmtk_crtc_ddp_irq -\u003e\nmtk_drm_finish_page_flip:\nlock\nmtk_crtc-\u003eevent set to null,\npending_needs_vblank set to false\nunlock\n pending_needs_vblank set to true,\n\n step 2:\n mtk_crtc_ddp_irq -\u003e\n mtk_drm_finish_page_flip called again,\n pending_needs_vblank is still true\n //null pointer\n\nInstead of guarding the entire mtk_drm_crtc_atomic_flush(), it\u0027s more\nefficient to just check if mtk_crtc-\u003eevent is null before use.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26874",
"url": "https://www.suse.com/security/cve/CVE-2024-26874"
},
{
"category": "external",
"summary": "SUSE Bug 1223048 for CVE-2024-26874",
"url": "https://bugzilla.suse.com/1223048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26876"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: adv7511: fix crash on irq during probe\n\nMoved IRQ registration down to end of adv7511_probe().\n\nIf an IRQ already is pending during adv7511_probe\n(before adv7511_cec_init) then cec_received_msg_ts\ncould crash using uninitialized data:\n\n Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5\n Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP\n Call trace:\n cec_received_msg_ts+0x48/0x990 [cec]\n adv7511_cec_irq_process+0x1cc/0x308 [adv7511]\n adv7511_irq_process+0xd8/0x120 [adv7511]\n adv7511_irq_handler+0x1c/0x30 [adv7511]\n irq_thread_fn+0x30/0xa0\n irq_thread+0x14c/0x238\n kthread+0x190/0x1a8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26876",
"url": "https://www.suse.com/security/cve/CVE-2024-26876"
},
{
"category": "external",
"summary": "SUSE Bug 1223119 for CVE-2024-26876",
"url": "https://bugzilla.suse.com/1223119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26900"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26900",
"url": "https://www.suse.com/security/cve/CVE-2024-26900"
},
{
"category": "external",
"summary": "SUSE Bug 1223046 for CVE-2024-26900",
"url": "https://bugzilla.suse.com/1223046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26915"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Reset IH OVERFLOW_CLEAR bit\n\nAllows us to detect subsequent IH ring buffer overflows as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26915",
"url": "https://www.suse.com/security/cve/CVE-2024-26915"
},
{
"category": "external",
"summary": "SUSE Bug 1223207 for CVE-2024-26915",
"url": "https://bugzilla.suse.com/1223207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26920"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/trigger: Fix to return error if failed to alloc snapshot\n\nFix register_snapshot_trigger() to return error code if it failed to\nallocate a snapshot instead of 0 (success). Unless that, it will register\nsnapshot trigger without an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26920",
"url": "https://www.suse.com/security/cve/CVE-2024-26920"
},
{
"category": "external",
"summary": "SUSE Bug 1228237 for CVE-2024-26920",
"url": "https://bugzilla.suse.com/1228237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26921"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug. Quoting Eric:\n Calling ip_defrag() in output path is also implying skb_orphan(),\n which is buggy because output path relies on sk not disappearing.\n\n A relevant old patch about the issue was :\n 8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n [..]\n\n net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n inet socket, not an arbitrary one.\n\n If we orphan the packet in ipvlan, then downstream things like FQ\n packet scheduler will not work properly.\n\n We need to change ip_defrag() to only use skb_orphan() when really\n needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned. This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26921",
"url": "https://www.suse.com/security/cve/CVE-2024-26921"
},
{
"category": "external",
"summary": "SUSE Bug 1223138 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "external",
"summary": "SUSE Bug 1223139 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26929"
}
],
"notes": [
{
"category": "general",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26929",
"url": "https://www.suse.com/security/cve/CVE-2024-26929"
},
{
"category": "external",
"summary": "SUSE Bug 1223715 for CVE-2024-26929",
"url": "https://bugzilla.suse.com/1223715"
},
{
"category": "external",
"summary": "SUSE Bug 1223716 for CVE-2024-26929",
"url": "https://bugzilla.suse.com/1223716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26930"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha-\u003evp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha-\u003evp_map. ha-\u003evp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26930",
"url": "https://www.suse.com/security/cve/CVE-2024-26930"
},
{
"category": "external",
"summary": "SUSE Bug 1223626 for CVE-2024-26930",
"url": "https://bugzilla.suse.com/1223626"
},
{
"category": "external",
"summary": "SUSE Bug 1223681 for CVE-2024-26930",
"url": "https://bugzilla.suse.com/1223681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26931"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix command flush on cable pull\n\nSystem crash due to command failed to flush back to SCSI layer.\n\n BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP NOPTI\n CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- - - 4.18.0-372.9.1.el8.x86_64 #1\n Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021\n Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]\n RIP: 0010:__wake_up_common+0x4c/0x190\n Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 \u003c49\u003e 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75\n RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086\n RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320\n RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8\n R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20\n R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n __wake_up_common_lock+0x7c/0xc0\n qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0\n ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.\n ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1\n ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]\n qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0\n ? __switch_to+0x10c/0x450\n ? process_one_work+0x1a7/0x360\n qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.\n ? worker_thread+0x1ce/0x390\n ? create_worker+0x1a0/0x1a0\n qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70\n ? kthread+0x10a/0x120\n qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8\n ? set_kthread_struct+0x40/0x40\n qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.\n ? ret_from_fork+0x1f/0x40\n qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout\n\nThe system was under memory stress where driver was not able to allocate an\nSRB to carry out error recovery of cable pull. The failure to flush causes\nupper layer to start modifying scsi_cmnd. When the system frees up some\nmemory, the subsequent cable pull trigger another command flush. At this\npoint the driver access a null pointer when attempting to DMA unmap the\nSGL.\n\nAdd a check to make sure commands are flush back on session tear down to\nprevent the null pointer access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26931",
"url": "https://www.suse.com/security/cve/CVE-2024-26931"
},
{
"category": "external",
"summary": "SUSE Bug 1223627 for CVE-2024-26931",
"url": "https://bugzilla.suse.com/1223627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface\u0027s parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected. As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete. But usb_deauthorize_interface() can\u0027t complete\nuntil the device lock has been released, and the lock won\u0027t be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun \u003csamsun1006219@gmail.com\u003e\nReported by: xingwei lee \u003cxrivendell7@gmail.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26934",
"url": "https://www.suse.com/security/cve/CVE-2024-26934"
},
{
"category": "external",
"summary": "SUSE Bug 1223671 for CVE-2024-26934",
"url": "https://bugzilla.suse.com/1223671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26957"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix reference counting on zcrypt card objects\n\nTests with hot-plugging crytpo cards on KVM guests with debug\nkernel build revealed an use after free for the load field of\nthe struct zcrypt_card. The reason was an incorrect reference\nhandling of the zcrypt card object which could lead to a free\nof the zcrypt card object while it was still in use.\n\nThis is an example of the slab message:\n\n kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b\n kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43\n kernel: kmalloc_trace+0x3f2/0x470\n kernel: zcrypt_card_alloc+0x36/0x70 [zcrypt]\n kernel: zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]\n kernel: ap_device_probe+0x15c/0x290\n kernel: really_probe+0xd2/0x468\n kernel: driver_probe_device+0x40/0xf0\n kernel: __device_attach_driver+0xc0/0x140\n kernel: bus_for_each_drv+0x8c/0xd0\n kernel: __device_attach+0x114/0x198\n kernel: bus_probe_device+0xb4/0xc8\n kernel: device_add+0x4d2/0x6e0\n kernel: ap_scan_adapter+0x3d0/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43\n kernel: kfree+0x37e/0x418\n kernel: zcrypt_card_put+0x54/0x80 [zcrypt]\n kernel: ap_device_remove+0x4c/0xe0\n kernel: device_release_driver_internal+0x1c4/0x270\n kernel: bus_remove_device+0x100/0x188\n kernel: device_del+0x164/0x3c0\n kernel: device_unregister+0x30/0x90\n kernel: ap_scan_adapter+0xc8/0x7c0\n kernel: ap_scan_bus+0x5a/0x3b0\n kernel: ap_scan_bus_wq_callback+0x40/0x60\n kernel: process_one_work+0x26e/0x620\n kernel: worker_thread+0x21c/0x440\n kernel: kthread+0x150/0x168\n kernel: __ret_from_fork+0x3c/0x58\n kernel: ret_from_fork+0xa/0x30\n kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)\n kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88\n kernel: Redzone 00000000885a74b0: bb bb bb bb bb bb bb bb ........\n kernel: Object 00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk\n kernel: Object 00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5 kkkkkkkkkkhKkkk.\n kernel: Redzone 00000000885a7518: bb bb bb bb bb bb bb bb ........\n kernel: Padding 00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ\n kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2\n kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)\n kernel: Call Trace:\n kernel: [\u003c00000000ca5ab5b8\u003e] dump_stack_lvl+0x90/0x120\n kernel: [\u003c00000000c99d78bc\u003e] check_bytes_and_report+0x114/0x140\n kernel: [\u003c00000000c99d53cc\u003e] check_object+0x334/0x3f8\n kernel: [\u003c00000000c99d820c\u003e] alloc_debug_processing+0xc4/0x1f8\n kernel: [\u003c00000000c99d852e\u003e] get_partial_node.part.0+0x1ee/0x3e0\n kernel: [\u003c00000000c99d94ec\u003e] ___slab_alloc+0xaf4/0x13c8\n kernel: [\u003c00000000c99d9e38\u003e] __slab_alloc.constprop.0+0x78/0xb8\n kernel: [\u003c00000000c99dc8dc\u003e] __kmalloc+0x434/0x590\n kernel: [\u003c00000000c9b4c0ce\u003e] ext4_htree_store_dirent+0x4e/0x1c0\n kernel: [\u003c00000000c9b908a2\u003e] htree_dirblock_to_tree+0x17a/0x3f0\n kernel: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26957",
"url": "https://www.suse.com/security/cve/CVE-2024-26957"
},
{
"category": "external",
"summary": "SUSE Bug 1223666 for CVE-2024-26957",
"url": "https://bugzilla.suse.com/1223666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26958"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we\u0027re completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we\u0027re submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes. With my patch the stress test has been running for\nseveral hours without popping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26958",
"url": "https://www.suse.com/security/cve/CVE-2024-26958"
},
{
"category": "external",
"summary": "SUSE Bug 1223653 for CVE-2024-26958",
"url": "https://bugzilla.suse.com/1223653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26984"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee \u003c48\u003e 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS: 00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt-\u003ememory-\u003eptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won\u0027t have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it\u0027s write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26984",
"url": "https://www.suse.com/security/cve/CVE-2024-26984"
},
{
"category": "external",
"summary": "SUSE Bug 1223633 for CVE-2024-26984",
"url": "https://bugzilla.suse.com/1223633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error\n\nWhen ncm function is working and then stop usb0 interface for link down,\neth_stop() is called. At this piont, accidentally if usb transport error\nshould happen in usb_ep_enable(), \u0027in_ep\u0027 and/or \u0027out_ep\u0027 may not be enabled.\n\nAfter that, ncm_disable() is called to disable for ncm unbind\nbut gether_disconnect() is never called since \u0027in_ep\u0027 is not enabled.\n\nAs the result, ncm object is released in ncm unbind\nbut \u0027dev-\u003eport_usb\u0027 associated to \u0027ncm-\u003eport\u0027 is not NULL.\n\nAnd when ncm bind again to recover netdev, ncm object is reallocated\nbut usb0 interface is already associated to previous released ncm object.\n\nTherefore, once usb0 interface is up and eth_start_xmit() is called,\nreleased ncm object is dereferrenced and it might cause use-after-free memory.\n\n[function unlink via configfs]\n usb0: eth_stop dev-\u003eport_usb=ffffff9b179c3200\n --\u003e error happens in usb_ep_enable().\n NCM: ncm_disable: ncm=ffffff9b179c3200\n --\u003e no gether_disconnect() since ncm-\u003eport.in_ep-\u003eenabled is false.\n NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200\n NCM: ncm_free: ncm free ncm=ffffff9b179c3200 \u003c-- released ncm\n\n[function link via configfs]\n NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000\n NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000\n NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0\n usb0: eth_open dev-\u003eport_usb=ffffff9b179c3200 \u003c-- previous released ncm\n usb0: eth_start dev-\u003eport_usb=ffffff9b179c3200 \u003c--\n eth_start_xmit()\n --\u003e dev-\u003ewrap()\n Unable to handle kernel paging request at virtual address dead00000000014f\n\nThis patch addresses the issue by checking if \u0027ncm-\u003enetdev\u0027 is not NULL at\nncm_disable() to call gether_disconnect() to deassociate \u0027dev-\u003eport_usb\u0027.\nIt\u0027s more reasonable to check \u0027ncm-\u003enetdev\u0027 to call gether_connect/disconnect\nrather than check \u0027ncm-\u003eport.in_ep-\u003eenabled\u0027 since it might not be enabled\nbut the gether connection might be established.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26996",
"url": "https://www.suse.com/security/cve/CVE-2024-26996"
},
{
"category": "external",
"summary": "SUSE Bug 1223752 for CVE-2024-26996",
"url": "https://bugzilla.suse.com/1223752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27008"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: nv04: Fix out of bounds access\n\nWhen Output Resource (dcb-\u003eor) value is assigned in\nfabricate_dcb_output(), there may be out of bounds access to\ndac_users array in case dcb-\u003eor is zero because ffs(dcb-\u003eor) is\nused as index there.\nThe \u0027or\u0027 argument of fabricate_dcb_output() must be interpreted as a\nnumber of bit to set, not value.\n\nUtilize macros from \u0027enum nouveau_or\u0027 in calls instead of hardcoding.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27008",
"url": "https://www.suse.com/security/cve/CVE-2024-27008"
},
{
"category": "external",
"summary": "SUSE Bug 1223802 for CVE-2024-27008",
"url": "https://bugzilla.suse.com/1223802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module\u0027s refcount. Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27054",
"url": "https://www.suse.com/security/cve/CVE-2024-27054"
},
{
"category": "external",
"summary": "SUSE Bug 1223819 for CVE-2024-27054",
"url": "https://bugzilla.suse.com/1223819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands. The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0. While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device\u0027s ID\ninformation is 0. This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27059",
"url": "https://www.suse.com/security/cve/CVE-2024-27059"
},
{
"category": "external",
"summary": "SUSE Bug 1223738 for CVE-2024-27059",
"url": "https://bugzilla.suse.com/1223738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I\u0027ve missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 \u003c48\u003e 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS: 00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555] \u003cTASK\u003e\n[ 4562.099573] ? die_addr+0x36/0x90\n[ 4562.099583] ? exc_general_protection+0x246/0x4a0\n[ 4562.099593] ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600] ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730] nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861] nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986] nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156] ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163] ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182] ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189] nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356] __do_fault+0x32/0x150\n[ 4562.100362] do_fault+0x7c/0x560\n[ 4562.100369] __handle_mm_fault+0x800/0xc10\n[ 4562.100382] handle_mm_fault+0x17c/0x3e0\n[ 4562.100388] do_user_addr_fault+0x208/0x860\n[ 4562.100395] exc_page_fault+0x7f/0x200\n[ 4562.100402] asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 \u003c44\u003e 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446] \u003c/TASK\u003e\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27062",
"url": "https://www.suse.com/security/cve/CVE-2024-27062"
},
{
"category": "external",
"summary": "SUSE Bug 1223834 for CVE-2024-27062",
"url": "https://bugzilla.suse.com/1223834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27388"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa-\u003edata need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27388",
"url": "https://www.suse.com/security/cve/CVE-2024-27388"
},
{
"category": "external",
"summary": "SUSE Bug 1223744 for CVE-2024-27388",
"url": "https://bugzilla.suse.com/1223744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27396"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27396",
"url": "https://www.suse.com/security/cve/CVE-2024-27396"
},
{
"category": "external",
"summary": "SUSE Bug 1224096 for CVE-2024-27396",
"url": "https://bugzilla.suse.com/1224096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free bugs caused by sco_sock_timeout\n\nWhen the sco connection is established and then, the sco socket\nis releasing, timeout_work will be scheduled to judge whether\nthe sco disconnection is timeout. The sock will be deallocated\nlater, but it is dereferenced again in sco_sock_timeout. As a\nresult, the use-after-free bugs will happen. The root cause is\nshown below:\n\n Cleanup Thread | Worker Thread\nsco_sock_release |\n sco_sock_close |\n __sco_sock_close |\n sco_sock_set_timer |\n schedule_delayed_work |\n sco_sock_kill | (wait a time)\n sock_put(sk) //FREE | sco_sock_timeout\n | sock_hold(sk) //USE\n\nThe KASAN report triggered by POC is shown below:\n\n[ 95.890016] ==================================================================\n[ 95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7\n...\n[ 95.890755] Workqueue: events sco_sock_timeout\n[ 95.890755] Call Trace:\n[ 95.890755] \u003cTASK\u003e\n[ 95.890755] dump_stack_lvl+0x45/0x110\n[ 95.890755] print_address_description+0x78/0x390\n[ 95.890755] print_report+0x11b/0x250\n[ 95.890755] ? __virt_addr_valid+0xbe/0xf0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_report+0x139/0x170\n[ 95.890755] ? update_load_avg+0xe5/0x9f0\n[ 95.890755] ? sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] kasan_check_range+0x2c3/0x2e0\n[ 95.890755] sco_sock_timeout+0x5e/0x1c0\n[ 95.890755] process_one_work+0x561/0xc50\n[ 95.890755] worker_thread+0xab2/0x13c0\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] kthread+0x279/0x300\n[ 95.890755] ? pr_cont_work+0x490/0x490\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork+0x34/0x60\n[ 95.890755] ? kthread_blkcg+0xa0/0xa0\n[ 95.890755] ret_from_fork_asm+0x11/0x20\n[ 95.890755] \u003c/TASK\u003e\n[ 95.890755]\n[ 95.890755] Allocated by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] __kasan_kmalloc+0x86/0x90\n[ 95.890755] __kmalloc+0x17f/0x360\n[ 95.890755] sk_prot_alloc+0xe1/0x1a0\n[ 95.890755] sk_alloc+0x31/0x4e0\n[ 95.890755] bt_sock_alloc+0x2b/0x2a0\n[ 95.890755] sco_sock_create+0xad/0x320\n[ 95.890755] bt_sock_create+0x145/0x320\n[ 95.890755] __sock_create+0x2e1/0x650\n[ 95.890755] __sys_socket+0xd0/0x280\n[ 95.890755] __x64_sys_socket+0x75/0x80\n[ 95.890755] do_syscall_64+0xc4/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] Freed by task 506:\n[ 95.890755] kasan_save_track+0x3f/0x70\n[ 95.890755] kasan_save_free_info+0x40/0x50\n[ 95.890755] poison_slab_object+0x118/0x180\n[ 95.890755] __kasan_slab_free+0x12/0x30\n[ 95.890755] kfree+0xb2/0x240\n[ 95.890755] __sk_destruct+0x317/0x410\n[ 95.890755] sco_sock_release+0x232/0x280\n[ 95.890755] sock_close+0xb2/0x210\n[ 95.890755] __fput+0x37f/0x770\n[ 95.890755] task_work_run+0x1ae/0x210\n[ 95.890755] get_signal+0xe17/0xf70\n[ 95.890755] arch_do_signal_or_restart+0x3f/0x520\n[ 95.890755] syscall_exit_to_user_mode+0x55/0x120\n[ 95.890755] do_syscall_64+0xd1/0x1b0\n[ 95.890755] entry_SYSCALL_64_after_hwframe+0x67/0x6f\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the object at ffff88800c388000\n[ 95.890755] which belongs to the cache kmalloc-1k of size 1024\n[ 95.890755] The buggy address is located 128 bytes inside of\n[ 95.890755] freed 1024-byte region [ffff88800c388000, ffff88800c388400)\n[ 95.890755]\n[ 95.890755] The buggy address belongs to the physical page:\n[ 95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388\n[ 95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n[ 95.890755] ano\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27398",
"url": "https://www.suse.com/security/cve/CVE-2024-27398"
},
{
"category": "external",
"summary": "SUSE Bug 1224174 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1224174"
},
{
"category": "external",
"summary": "SUSE Bug 1225013 for CVE-2024-27398",
"url": "https://bugzilla.suse.com/1225013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27401"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27401",
"url": "https://www.suse.com/security/cve/CVE-2024-27401"
},
{
"category": "external",
"summary": "SUSE Bug 1224181 for CVE-2024-27401",
"url": "https://bugzilla.suse.com/1224181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_net_busy_read\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27419",
"url": "https://www.suse.com/security/cve/CVE-2024-27419"
},
{
"category": "external",
"summary": "SUSE Bug 1224759 for CVE-2024-27419",
"url": "https://bugzilla.suse.com/1224759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "low"
}
],
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27436"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Stop parsing channels bits when all channels are found.\n\nIf a usb audio device sets more bits than the amount of channels\nit could write outside of the map array.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27436",
"url": "https://www.suse.com/security/cve/CVE-2024-27436"
},
{
"category": "external",
"summary": "SUSE Bug 1224803 for CVE-2024-27436",
"url": "https://bugzilla.suse.com/1224803"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Flush pages under kvm-\u003elock to fix UAF in svm_register_enc_region()\n\nDo the cache flush of converted pages in svm_register_enc_region() before\ndropping kvm-\u003elock to fix use-after-free issues where region and/or its\narray of pages could be freed by a different task, e.g. if userspace has\n__unregister_enc_region_locked() already queued up for the region.\n\nNote, the \"obvious\" alternative of using local variables doesn\u0027t fully\nresolve the bug, as region-\u003epages is also dynamically allocated. I.e. the\nregion structure itself would be fine, but region-\u003epages could be freed.\n\nFlushing multiple pages under kvm-\u003elock is unfortunate, but the entire\nflow is a rare slow path, and the manual flush is only needed on CPUs that\nlack coherency for encrypted memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35791",
"url": "https://www.suse.com/security/cve/CVE-2024-35791"
},
{
"category": "external",
"summary": "SUSE Bug 1224725 for CVE-2024-35791",
"url": "https://bugzilla.suse.com/1224725"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn\u0027t really\nguarantee that. It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete. In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync(). [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point. A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35809",
"url": "https://www.suse.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "SUSE Bug 1224738 for CVE-2024-35809",
"url": "https://bugzilla.suse.com/1224738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach\n\nThis is the candidate patch of CVE-2023-47233 :\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-47233\n\nIn brcm80211 driver,it starts with the following invoking chain\nto start init a timeout worker:\n\n-\u003ebrcmf_usb_probe\n -\u003ebrcmf_usb_probe_cb\n -\u003ebrcmf_attach\n -\u003ebrcmf_bus_started\n -\u003ebrcmf_cfg80211_attach\n -\u003ewl_init_priv\n -\u003ebrcmf_init_escan\n -\u003eINIT_WORK(\u0026cfg-\u003eescan_timeout_work,\n\t\t brcmf_cfg80211_escan_timeout_worker);\n\nIf we disconnect the USB by hotplug, it will call\nbrcmf_usb_disconnect to make cleanup. The invoking chain is :\n\nbrcmf_usb_disconnect\n -\u003ebrcmf_usb_disconnect_cb\n -\u003ebrcmf_detach\n -\u003ebrcmf_cfg80211_detach\n -\u003ekfree(cfg);\n\nWhile the timeout woker may still be running. This will cause\na use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.\n\nFix it by deleting the timer and canceling the worker in\nbrcmf_cfg80211_detach.\n\n[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35811",
"url": "https://www.suse.com/security/cve/CVE-2024-35811"
},
{
"category": "external",
"summary": "SUSE Bug 1224592 for CVE-2024-35811",
"url": "https://bugzilla.suse.com/1224592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35830"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tc358743: register v4l2 async device only after successful setup\n\nEnsure the device has been setup correctly before registering the v4l2\nasync device, thus allowing userspace to access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35830",
"url": "https://www.suse.com/security/cve/CVE-2024-35830"
},
{
"category": "external",
"summary": "SUSE Bug 1224680 for CVE-2024-35830",
"url": "https://bugzilla.suse.com/1224680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35849"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix information leak in btrfs_ioctl_logical_to_ino()\n\nSyzbot reported the following information leak for in\nbtrfs_ioctl_logical_to_ino():\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x110 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Uninit was created at:\n __kmalloc_large_node+0x231/0x370 mm/slub.c:3921\n __do_kmalloc_node mm/slub.c:3954 [inline]\n __kmalloc_node+0xb07/0x1060 mm/slub.c:3973\n kmalloc_node include/linux/slab.h:648 [inline]\n kvmalloc_node+0xc0/0x2d0 mm/util.c:634\n kvmalloc include/linux/slab.h:766 [inline]\n init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779\n btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480\n btrfs_ioctl+0x714/0x1260\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890\n __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890\n x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n Bytes 40-65535 of 65536 are uninitialized\n Memory access of size 65536 starts at ffff888045a40000\n\nThis happens, because we\u0027re copying a \u0027struct btrfs_data_container\u0027 back\nto user-space. This btrfs_data_container is allocated in\n\u0027init_data_container()\u0027 via kvmalloc(), which does not zero-fill the\nmemory.\n\nFix this by using kvzalloc() which zeroes out the memory on allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35849",
"url": "https://www.suse.com/security/cve/CVE-2024-35849"
},
{
"category": "external",
"summary": "SUSE Bug 1224733 for CVE-2024-35849",
"url": "https://bugzilla.suse.com/1224733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35877"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35877",
"url": "https://www.suse.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "SUSE Bug 1224525 for CVE-2024-35877",
"url": "https://bugzilla.suse.com/1224525"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35887"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nax25: fix use-after-free bugs caused by ax25_ds_del_timer\n\nWhen the ax25 device is detaching, the ax25_dev_device_down()\ncalls ax25_ds_del_timer() to cleanup the slave_timer. When\nthe timer handler is running, the ax25_ds_del_timer() that\ncalls del_timer() in it will return directly. As a result,\nthe use-after-free bugs could happen, one of the scenarios\nis shown below:\n\n (Thread 1) | (Thread 2)\n | ax25_ds_timeout()\nax25_dev_device_down() |\n ax25_ds_del_timer() |\n del_timer() |\n ax25_dev_put() //FREE |\n | ax25_dev-\u003e //USE\n\nIn order to mitigate bugs, when the device is detaching, use\ntimer_shutdown_sync() to stop the timer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35887",
"url": "https://www.suse.com/security/cve/CVE-2024-35887"
},
{
"category": "external",
"summary": "SUSE Bug 1224663 for CVE-2024-35887",
"url": "https://bugzilla.suse.com/1224663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35895"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Prevent lock inversion deadlock in map delete elem\n\nsyzkaller started using corpuses where a BPF tracing program deletes\nelements from a sockmap/sockhash map. Because BPF tracing programs can be\ninvoked from any interrupt context, locks taken during a map_delete_elem\noperation must be hardirq-safe. Otherwise a deadlock due to lock inversion\nis possible, as reported by lockdep:\n\n CPU0 CPU1\n ---- ----\n lock(\u0026htab-\u003ebuckets[i].lock);\n local_irq_disable();\n lock(\u0026host-\u003elock);\n lock(\u0026htab-\u003ebuckets[i].lock);\n \u003cInterrupt\u003e\n lock(\u0026host-\u003elock);\n\nLocks in sockmap are hardirq-unsafe by design. We expects elements to be\ndeleted from sockmap/sockhash only in task (normal) context with interrupts\nenabled, or in softirq context.\n\nDetect when map_delete_elem operation is invoked from a context which is\n_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an\nerror.\n\nNote that map updates are not affected by this issue. BPF verifier does not\nallow updating sockmap/sockhash from a BPF tracing program today.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35895",
"url": "https://www.suse.com/security/cve/CVE-2024-35895"
},
{
"category": "external",
"summary": "SUSE Bug 1224511 for CVE-2024-35895",
"url": "https://bugzilla.suse.com/1224511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35914"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix error cleanup path in nfsd_rename()\n\nCommit a8b0026847b8 (\"rename(): avoid a deadlock in the case of parents\nhaving no common ancestor\") added an error bail out path. However this\npath does not drop the remount protection that has been acquired. Fix\nthe cleanup path to properly drop the remount protection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35914",
"url": "https://www.suse.com/security/cve/CVE-2024-35914"
},
{
"category": "external",
"summary": "SUSE Bug 1224482 for CVE-2024-35914",
"url": "https://bugzilla.suse.com/1224482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35932"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don\u0027t check if plane-\u003estate-\u003efb == state-\u003efb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[ 110.908514] ------------[ cut here ]------------\n[ 110.908529] refcount_t: underflow; use-after-free.\n[ 110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[ 110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[ 110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G C 6.1.66-v8+ #32\n[ 110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[ 110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[ 110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[ 110.909170] sp : ffffffc00913b9c0\n[ 110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[ 110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[ 110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[ 110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[ 110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[ 110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[ 110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[ 110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[ 110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[ 110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[ 110.909434] Call trace:\n[ 110.909441] refcount_dec_not_one+0xb8/0xc0\n[ 110.909461] vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[ 110.909903] vc4_cleanup_fb+0x44/0x50 [vc4]\n[ 110.910315] drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[ 110.910669] vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[ 110.911079] commit_tail+0xb0/0x164 [drm_kms_helper]\n[ 110.911397] drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[ 110.911716] drm_atomic_commit+0xb0/0xdc [drm]\n[ 110.912569] drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[ 110.913330] drm_ioctl_kernel+0xec/0x15c [drm]\n[ 110.914091] drm_ioctl+0x24c/0x3b0 [drm]\n[ 110.914850] __arm64_sys_ioctl+0x9c/0xd4\n[ 110.914873] invoke_syscall+0x4c/0x114\n[ 110.914897] el0_svc_common+0xd0/0x118\n[ 110.914917] do_el0_svc+0x38/0xd0\n[ 110.914936] el0_svc+0x30/0x8c\n[ 110.914958] el0t_64_sync_handler+0x84/0xf0\n[ 110.914979] el0t_64_sync+0x18c/0x190\n[ 110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane-\u003estate-\u003efb == state-\u003efb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don\u0027t decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn\u0027t be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35932",
"url": "https://www.suse.com/security/cve/CVE-2024-35932"
},
{
"category": "external",
"summary": "SUSE Bug 1224650 for CVE-2024-35932",
"url": "https://bugzilla.suse.com/1224650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35935"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: handle path ref underflow in header iterate_inode_ref()\n\nChange BUG_ON to proper error handling if building the path buffer\nfails. The pointers are not printed so we don\u0027t accidentally leak kernel\naddresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35935",
"url": "https://www.suse.com/security/cve/CVE-2024-35935"
},
{
"category": "external",
"summary": "SUSE Bug 1224645 for CVE-2024-35935",
"url": "https://bugzilla.suse.com/1224645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35936"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()\n\nThe unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,\nas it could be caused only by two impossible conditions:\n\n- at first the search key is set up to look for a chunk tree item, with\n offset -1, this is an inexact search and the key-\u003eoffset will contain\n the correct offset upon a successful search, a valid chunk tree item\n cannot have an offset -1\n\n- after first successful search, the found_key corresponds to a chunk\n item, the offset is decremented by 1 before the next loop, it\u0027s\n impossible to find a chunk item there due to alignment and size\n constraints",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35936",
"url": "https://www.suse.com/security/cve/CVE-2024-35936"
},
{
"category": "external",
"summary": "SUSE Bug 1224644 for CVE-2024-35936",
"url": "https://bugzilla.suse.com/1224644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35944",
"url": "https://www.suse.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "SUSE Bug 1224648 for CVE-2024-35944",
"url": "https://bugzilla.suse.com/1224648"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35955"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE -\u003e\n MODULE_STATE_GOING -\u003e MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module-\u003estate becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module-\u003estate has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35955",
"url": "https://www.suse.com/security/cve/CVE-2024-35955"
},
{
"category": "external",
"summary": "SUSE Bug 1224676 for CVE-2024-35955",
"url": "https://bugzilla.suse.com/1224676"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35969"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr\n\nAlthough ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it\nstill means hlist_for_each_entry_rcu can return an item that got removed\nfrom the list. The memory itself of such item is not freed thanks to RCU\nbut nothing guarantees the actual content of the memory is sane.\n\nIn particular, the reference count can be zero. This can happen if\nipv6_del_addr is called in parallel. ipv6_del_addr removes the entry\nfrom inet6_addr_lst (hlist_del_init_rcu(\u0026ifp-\u003eaddr_lst)) and drops all\nreferences (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough\ntiming, this can happen:\n\n1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.\n\n2. Then, the whole ipv6_del_addr is executed for the given entry. The\n reference count drops to zero and kfree_rcu is scheduled.\n\n3. ipv6_get_ifaddr continues and tries to increments the reference count\n (in6_ifa_hold).\n\n4. The rcu is unlocked and the entry is freed.\n\n5. The freed entry is returned.\n\nPrevent increasing of the reference count in such case. The name\nin6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.\n\n[ 41.506330] refcount_t: addition on 0; use-after-free.\n[ 41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130\n[ 41.507413] Modules linked in: veth bridge stp llc\n[ 41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14\n[ 41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n[ 41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130\n[ 41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 \u003c0f\u003e 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff\n[ 41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282\n[ 41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000\n[ 41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900\n[ 41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff\n[ 41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000\n[ 41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48\n[ 41.514086] FS: 00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000\n[ 41.514726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0\n[ 41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 41.516799] Call Trace:\n[ 41.517037] \u003cTASK\u003e\n[ 41.517249] ? __warn+0x7b/0x120\n[ 41.517535] ? refcount_warn_saturate+0xa5/0x130\n[ 41.517923] ? report_bug+0x164/0x190\n[ 41.518240] ? handle_bug+0x3d/0x70\n[ 41.518541] ? exc_invalid_op+0x17/0x70\n[ 41.520972] ? asm_exc_invalid_op+0x1a/0x20\n[ 41.521325] ? refcount_warn_saturate+0xa5/0x130\n[ 41.521708] ipv6_get_ifaddr+0xda/0xe0\n[ 41.522035] inet6_rtm_getaddr+0x342/0x3f0\n[ 41.522376] ? __pfx_inet6_rtm_getaddr+0x10/0x10\n[ 41.522758] rtnetlink_rcv_msg+0x334/0x3d0\n[ 41.523102] ? netlink_unicast+0x30f/0x390\n[ 41.523445] ? __pfx_rtnetlink_rcv_msg+0x10/0x10\n[ 41.523832] netlink_rcv_skb+0x53/0x100\n[ 41.524157] netlink_unicast+0x23b/0x390\n[ 41.524484] netlink_sendmsg+0x1f2/0x440\n[ 41.524826] __sys_sendto+0x1d8/0x1f0\n[ 41.525145] __x64_sys_sendto+0x1f/0x30\n[ 41.525467] do_syscall_64+0xa5/0x1b0\n[ 41.525794] entry_SYSCALL_64_after_hwframe+0x72/0x7a\n[ 41.526213] RIP: 0033:0x7fbc4cfcea9a\n[ 41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89\n[ 41.527942] RSP: 002b:00007f\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35969",
"url": "https://www.suse.com/security/cve/CVE-2024-35969"
},
{
"category": "external",
"summary": "SUSE Bug 1224580 for CVE-2024-35969",
"url": "https://bugzilla.suse.com/1224580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: Avoid infinite loop trying to resize local TT\n\nIf the MTU of one of an attached interface becomes too small to transmit\nthe local translation table then it must be resized to fit inside all\nfragments (when enabled) or a single packet.\n\nBut if the MTU becomes too low to transmit even the header + the VLAN\nspecific part then the resizing of the local TT will never succeed. This\ncan for example happen when the usable space is 110 bytes and 11 VLANs are\non top of batman-adv. In this case, at least 116 byte would be needed.\nThere will just be an endless spam of\n\n batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)\n\nin the log but the function will never finish. Problem here is that the\ntimeout will be halved all the time and will then stagnate at 0 and\ntherefore never be able to reduce the table even more.\n\nThere are other scenarios possible with a similar result. The number of\nBATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too\nhigh to fit inside a packet. Such a scenario can therefore happen also with\nonly a single VLAN + 7 non-purgable addresses - requiring at least 120\nbytes.\n\nWhile this should be handled proactively when:\n\n* interface with too low MTU is added\n* VLAN is added\n* non-purgeable local mac is added\n* MTU of an attached interface is reduced\n* fragmentation setting gets disabled (which most likely requires dropping\n attached interfaces)\n\nnot all of these scenarios can be prevented because batman-adv is only\nconsuming events without the the possibility to prevent these actions\n(non-purgable MAC address added, MTU of an attached interface is reduced).\nIt is therefore necessary to also make sure that the code is able to handle\nalso the situations when there were already incompatible system\nconfiguration are present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35982",
"url": "https://www.suse.com/security/cve/CVE-2024-35982"
},
{
"category": "external",
"summary": "SUSE Bug 1224566 for CVE-2024-35982",
"url": "https://bugzilla.suse.com/1224566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-36015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36015"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36015",
"url": "https://www.suse.com/security/cve/CVE-2024-36015"
},
{
"category": "external",
"summary": "SUSE Bug 1225640 for CVE-2024-36015",
"url": "https://bugzilla.suse.com/1225640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36029"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn\u0027t set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36029",
"url": "https://www.suse.com/security/cve/CVE-2024-36029"
},
{
"category": "external",
"summary": "SUSE Bug 1225708 for CVE-2024-36029",
"url": "https://bugzilla.suse.com/1225708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-36954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36954"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36954",
"url": "https://www.suse.com/security/cve/CVE-2024-36954"
},
{
"category": "external",
"summary": "SUSE Bug 1225764 for CVE-2024-36954",
"url": "https://bugzilla.suse.com/1225764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.219.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-24T18:34:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-36954"
}
]
}
RHSA-2024:7001
Vulnerability from csaf_redhat - Published: 2024-09-24 00:40 - Updated: 2025-12-23 21:19Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. \nSecurity Fix(es):\n\n CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7001",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7001.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-12-23T21:19:45+00:00",
"generator": {
"date": "2025-12-23T21:19:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:7001",
"initial_release_date": "2024-09-24T00:40:51+00:00",
"revision_history": [
{
"date": "2024-09-24T00:40:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T00:40:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-23T21:19:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product_id": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-553.22.1.rt7.363.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46984",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266750"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to -\u003ebio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx\u0027s than the first one (i.e., if\nctx-\u003eindex_hw[hctx-\u003etype] \u003e hctx-\u003enr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type \u0027long unsigned int [128]\u0027\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n-\u003ebio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kyber: fix out of bounds access when preempted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46984"
},
{
"category": "external",
"summary": "RHBZ#2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: kyber: fix out of bounds access when preempted"
},
{
"cve": "CVE-2021-47097",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267925"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) stack memory access flaw was found in elantech_change_report_id in drivers/input/mouse/elantech.c in the Linux kernel\u2019s elantech module. This flaw allows a local attacker to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47097"
},
{
"category": "external",
"summary": "RHBZ#2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()"
},
{
"cve": "CVE-2021-47101",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267916"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nasix: fix uninit-value in asix_mdio_read()\n\nasix_read_cmd() may read less than sizeof(smsr) bytes and in this case\nsmsr will be uninitialized.\n\nFail log:\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\nBUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\n asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: asix: fix uninit-value in asix_mdio_read()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47101"
},
{
"category": "external",
"summary": "RHBZ#2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: asix: fix uninit-value in asix_mdio_read()"
},
{
"cve": "CVE-2021-47287",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282511"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47287"
},
{
"category": "external",
"summary": "RHBZ#2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail"
},
{
"cve": "CVE-2021-47289",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282508"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: fix NULL pointer dereference\n\nCommit 71f642833284 (\"ACPI: utils: Fix reference counting in\nfor_each_acpi_dev_match()\") started doing \"acpi_dev_put()\" on a pointer\nthat was possibly NULL. That fails miserably, because that helper\ninline function is not set up to handle that case.\n\nJust make acpi_dev_put() silently accept a NULL pointer, rather than\ncalling down to put_device() with an invalid offset off that NULL\npointer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: fix NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47289"
},
{
"category": "external",
"summary": "RHBZ#2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ACPI: fix NULL pointer dereference"
},
{
"cve": "CVE-2021-47321",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282440"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the del_timer() function in the Linux kernel\u0027s watchdog driver. This issue occurs because the function does not wait for the timer handler to finish, which may lead to a situation where the handler runs after the driver that has been removed, causing a use-after-free issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue does not allow unauthorized access or data leakage, but it poses a risk of system instability and crashes. The potential for a use-after-free condition can disrupt normal operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "RHBZ#2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()"
},
{
"cve": "CVE-2021-47338",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282422"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s fbmem subsystem. This issue arises when the system attempts to delete a video mode that is still in use, leading to potential use-after-free errors. This improper handling can result in system crashes or undefined behavior when accessing freed memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fbmem: Do not delete the mode that is still in use",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue affects system reliability by potentially causing errors when video modes are incorrectly managed, but it does not compromise the system\u0027s overall security posture or data integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47338"
},
{
"category": "external",
"summary": "RHBZ#2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47338",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fbmem: Do not delete the mode that is still in use"
},
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47383",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282357"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tty: Fix out-of-bound vmalloc access in imageblit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can lead to system crashes by accessing invalid memory addresses, it does not pose a direct threat to data security or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "RHBZ#2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tty: Fix out-of-bound vmalloc access in imageblit"
},
{
"cve": "CVE-2021-47384",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282356"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp \u0026 0x08) \u0026\u0026 (!(tmp \u0026 0x80)) \u0026\u0026 ((tmp \u0026 0x7) == ((tmp \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the impact is limited to system stability rather than unauthorized access or data exposure.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"category": "external",
"summary": "RHBZ#2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47385",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282355"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s hwmon driver for the w83792d module where a NULL pointer dereference was caused by the lm75[] obsolete structure field. During specific device read operations, if certain conditions are met, the driver may attempt to access a NULL pointer because this unnecessary field is being retained, which can lead to system crashes or instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a Moderate severity because it can cause crashes and operational disruptions. It does not expose sensitive information or allow unauthorized access.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of NULL pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies NULL dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47385"
},
{
"category": "external",
"summary": "RHBZ#2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47386",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282354"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val \u0026 0x08) \u0026\u0026 (!(val \u0026 0x80)) \u0026\u0026 ((val \u0026 0x7) == ((val \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the risk is linked to system crashes or unexpected behavior, which can disrupt normal operations but does not directly compromise sensitive data or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47386"
},
{
"category": "external",
"summary": "RHBZ#2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47393",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282345"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs\n\nFan speed minimum can be enforced from sysfs. For example, setting\ncurrent fan speed to 20 is used to enforce fan speed to be at 100%\nspeed, 19 - to be not below 90% speed, etcetera. This feature provides\nability to limit fan speed according to some system wise\nconsiderations, like absence of some replaceable units or high system\nambient temperature.\n\nRequest for changing fan minimum speed is configuration request and can\nbe set only through \u0027sysfs\u0027 write procedure. In this situation value of\nargument \u0027state\u0027 is above nominal fan speed maximum.\n\nReturn non-zero code in this case to avoid\nthermal_cooling_device_stats_update() call, because in this case\nstatistics update violates thermal statistics table range.\nThe issues is observed in case kernel is configured with option\nCONFIG_THERMAL_STATISTICS.\n\nHere is the trace from KASAN:\n[ 159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444\n[ 159.545625] Call Trace:\n[ 159.548366] dump_stack+0x92/0xc1\n[ 159.552084] ? thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.635869] thermal_zone_device_update+0x345/0x780\n[ 159.688711] thermal_zone_device_set_mode+0x7d/0xc0\n[ 159.694174] mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]\n[ 159.700972] ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]\n[ 159.731827] mlxsw_thermal_init+0x763/0x880 [mlxsw_core]\n[ 160.070233] RIP: 0033:0x7fd995909970\n[ 160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ..\n[ 160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970\n[ 160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001\n[ 160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700\n[ 160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013\n[ 160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013\n[ 160.143671]\n[ 160.145338] Allocated by task 2924:\n[ 160.149242] kasan_save_stack+0x19/0x40\n[ 160.153541] __kasan_kmalloc+0x7f/0xa0\n[ 160.157743] __kmalloc+0x1a2/0x2b0\n[ 160.161552] thermal_cooling_device_setup_sysfs+0xf9/0x1a0\n[ 160.167687] __thermal_cooling_device_register+0x1b5/0x500\n[ 160.173833] devm_thermal_of_cooling_device_register+0x60/0xa0\n[ 160.180356] mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]\n[ 160.248140]\n[ 160.249807] The buggy address belongs to the object at ffff888116163400\n[ 160.249807] which belongs to the cache kmalloc-1k of size 1024\n[ 160.263814] The buggy address is located 64 bytes to the right of\n[ 160.263814] 1024-byte region [ffff888116163400, ffff888116163800)\n[ 160.277536] The buggy address belongs to the page:\n[ 160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160\n[ 160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0\n[ 160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)\n[ 160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0\n[ 160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000\n[ 160.327033] page dumped because: kasan: bad access detected\n[ 160.333270]\n[ 160.334937] Memory state around the buggy address:\n[ 160.356469] \u003effff888116163800: fc ..",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can disrupt system operation by causing crashes or unpredictable behaviour under specific conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47393"
},
{
"category": "external",
"summary": "RHBZ#2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs"
},
{
"cve": "CVE-2021-47412",
"cwe": {
"id": "CWE-388",
"name": "CWE-388"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282324"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel, where improper handling of block I/O requests when a block I/O request (bio) is not tracked, the kernel erroneously calls the rq_qos_ops-\u003edone_bio function, potentially leading to use-after-free issues. This situation can occurr when the request queue is accessed after it has been freed, resulting in possible kernel panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity, as the issue can cause kernel panics, leading to system crashes. However, it does not affect data confidentiality or integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47412"
},
{
"category": "external",
"summary": "RHBZ#2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked"
},
{
"cve": "CVE-2021-47432",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282366"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Don\u0027t overflow in peek()\n\nWhen we started spreading new inode numbers throughout most of the 64\nbit inode space, that triggered some corner case bugs, in particular\nsome integer overflows related to the radix tree code. Oops.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47432"
},
{
"category": "external",
"summary": "RHBZ#2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()"
},
{
"cve": "CVE-2021-47441",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282851"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 \u003e /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003effff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47441"
},
{
"category": "external",
"summary": "RHBZ#2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses"
},
{
"cve": "CVE-2021-47455",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282903"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n hex dump (first 8 bytes):\n 70 74 70 30 00 00 00 00 ptp0....\n backtrace:\n [\u003c00000000312ed458\u003e] __kmalloc_track_caller+0x19f/0x3a0\n [\u003c0000000079f6e2ff\u003e] kvasprintf+0xb5/0x150\n [\u003c0000000026aae54f\u003e] kvasprintf_const+0x60/0x190\n [\u003c00000000f323a5f7\u003e] kobject_set_name_vargs+0x56/0x150\n [\u003c000000004e35abdd\u003e] dev_set_name+0xc0/0x100\n [\u003c00000000f20cfe25\u003e] ptp_clock_register+0x9f4/0xd30 [ptp]\n [\u003c000000008bb9f0de\u003e] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ptp: Fix possible memory leak in ptp_clock_register()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47455"
},
{
"category": "external",
"summary": "RHBZ#2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47455",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ptp: Fix possible memory leak in ptp_clock_register()"
},
{
"cve": "CVE-2021-47466",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282890"
}
],
"notes": [
{
"category": "description",
"text": "A potential memory leak was found in the Linux kernel, in kmem_cache_open(). This issue may lead to compromised system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47466"
},
{
"category": "external",
"summary": "RHBZ#2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()"
},
{
"cve": "CVE-2021-47497",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282918"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "RHBZ#2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells"
},
{
"cve": "CVE-2021-47527",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283424"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: core: fix transmit-buffer reset and memleak\n\nCommit 761ed4a94582 (\"tty: serial_core: convert uart_close to use\ntty_port_close\") converted serial core to use tty_port_close() but\nfailed to notice that the transmit buffer still needs to be freed on\nfinal close.\n\nNot freeing the transmit buffer means that the buffer is no longer\ncleared on next open so that any ioctl() waiting for the buffer to drain\nmight wait indefinitely (e.g. on termios changes) or that stale data can\nend up being transmitted in case tx is restarted.\n\nFurthermore, the buffer of any port that has been opened would leak on\ndriver unbind.\n\nNote that the port lock is held when clearing the buffer pointer due to\nthe ldisc race worked around by commit a5ba1d95e46e (\"uart: fix race\nbetween uart_put_char() and uart_shutdown()\").\n\nAlso note that the tty-port shutdown() callback is not called for\nconsole ports so it is not strictly necessary to free the buffer page\nafter releasing the lock (cf. d72402145ace (\"tty/serial: do not free\ntrasnmit buffer page under port lock\")).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: serial: core: fix transmit-buffer reset and memleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47527"
},
{
"category": "external",
"summary": "RHBZ#2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: serial: core: fix transmit-buffer reset and memleak"
},
{
"cve": "CVE-2021-47560",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283389"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"category": "external",
"summary": "RHBZ#2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
},
{
"cve": "CVE-2021-47582",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293247"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value. If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0 state:D stack:23192 pid: 8700 ppid: 8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs\u0027s calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47582"
},
{
"category": "external",
"summary": "RHBZ#2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable"
},
{
"cve": "CVE-2021-47609",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "RHBZ#2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver"
},
{
"cve": "CVE-2022-48619",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258012"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in drivers/input/input.c in the Linux Kernel, where the input_set_capability() function mishandles scenarios where an event code is outside the bitmap. This issue can lead to a kernel panic when the event code exceeds the bitmap for the specified event type, which could allow an attacker to cause a kernel crash and potential disruption of services.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48619"
},
{
"category": "external",
"summary": "RHBZ#2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619"
},
{
"category": "external",
"summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
"url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic"
},
{
"cve": "CVE-2022-48754",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293304"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: phylib: fix potential use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "RHBZ#2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: phylib: fix potential use-after-free"
},
{
"cve": "CVE-2022-48760",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293377"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "RHBZ#2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers"
},
{
"cve": "CVE-2022-48804",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298140"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48804"
},
{
"category": "external",
"summary": "RHBZ#2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate"
},
{
"cve": "CVE-2022-48836",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298177"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: aiptek - properly check endpoint type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48836"
},
{
"category": "external",
"summary": "RHBZ#2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: aiptek - properly check endpoint type"
},
{
"cve": "CVE-2022-48866",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298640"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the thrustmaster_interrupts function in the Linux kernel\u0027s HID Thrustmaster driver. This issue arises from a lack of validation for the actual number of endpoints, leading to a slab-out-of-bounds read when the code accesses the endpoint array.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 9.1 and greater include the relevant patch (fc3ef2e3297b) and are therefore unaffected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48866"
},
{
"category": "external",
"summary": "RHBZ#2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258013"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability was found in the Linux Kernel. This issue occurs during the creation of a new netfilter table. The absence of safeguards in the nf_tables_newtable function against invalid nf_tables family (pf) values allows attackers to achieve unauthorized access. Exploitation occurs in two locations: the xt_find_target function in x_tables.c permits faking xt_af data, and the nf_logger_find_get function in nf_log.c can enable an attacker to use an invalid pf to dereference adjacent global data. By manipulating these values, an attacker could achieve unauthorized access beyond the intended boundaries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability can only be triggered locally and the attacker needs to be logged into the system. For these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6040"
},
{
"category": "external",
"summary": "RHBZ#2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/01/12/1",
"url": "https://www.openwall.com/lists/oss-security/2024/01/12/1"
}
],
"release_date": "2024-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()"
},
{
"cve": "CVE-2023-52470",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266358"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in alloc_workqueue in the Linux Kernel. Check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null-ptr-deref in alloc_workqueue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52470"
},
{
"category": "external",
"summary": "RHBZ#2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
"url": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1",
"url": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41",
"url": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb",
"url": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
"url": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310",
"url": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85",
"url": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
"url": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: null-ptr-deref in alloc_workqueue"
},
{
"cve": "CVE-2023-52476",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267041"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n __insn_get_emulate_prefix()\n insn_get_emulate_prefix()\n insn_get_prefixes()\n insn_get_opcode()\n decode_branch_type()\n get_branch_type()\n intel_pmu_lbr_filter()\n intel_pmu_handle_irq()\n perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n (insn)-\u003enext_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/x86/lbr: Filter vsyscall addresses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52476"
},
{
"category": "external",
"summary": "RHBZ#2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/x86/lbr: Filter vsyscall addresses"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267036"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue can cause a potential crash on the receiver USB disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "RHBZ#2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect"
},
{
"cve": "CVE-2023-52522",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel that allows for potential store tearing within the neigh_periodic_work() function, meaning a write operation on a value is not protected properly and could result in inconsistencies if another process or thread reads from that value before the operation is complete.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix possible store tearing in neigh_periodic_work()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"category": "external",
"summary": "RHBZ#2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix possible store tearing in neigh_periodic_work()"
},
{
"cve": "CVE-2023-52605",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268295"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A NULL pointer dereference issue was identified in the Linux kernel within the ACPI subsystem\u0027s extlog module. In the extlog_exit() function, the extlog_l1_addr pointer was dereferenced before verifying if it was NULL, potentially causing system instability or crashes during the cleanup process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: extlog: fix NULL pointer dereference check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected upstream:- https://lore.kernel.org/linux-cve-announce/20240318151025.2952751-2-lee@kernel.org/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52605"
},
{
"category": "external",
"summary": "RHBZ#2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T"
}
],
"release_date": "2024-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: extlog: fix NULL pointer dereference check"
},
{
"cve": "CVE-2023-52683",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281317"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (\u003e UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52683"
},
{
"category": "external",
"summary": "RHBZ#2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282676"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] \u003cTASK\u003e\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] \u003c/TASK\u003e\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52817"
},
{
"category": "external",
"summary": "RHBZ#2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282757"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()\n\nThe put_device() calls rmi_release_function() which frees \"fn\" so the\ndereference on the next line \"fn-\u003enum_of_irqs\" is a use after free.\nMove the put_device() to the end to fix this.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52840"
},
{
"category": "external",
"summary": "RHBZ#2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()"
},
{
"cve": "CVE-2024-23848",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2260038"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. A use-after-free exists in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cec_queue_msg_fh",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23848"
},
{
"category": "external",
"summary": "RHBZ#2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/",
"url": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cec_queue_msg_fh"
},
{
"cve": "CVE-2024-26595",
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265799"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where a faulty error handler in the driver for certain Mellanox hardware could lead to a null pointer reference. This issue affects system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "RHBZ#2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271648"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Ensure visibility when inserting an element into tracing_map\n\nRunning the following two commands in parallel on a multi-processor\nAArch64 machine can sporadically produce an unexpected warning about\nduplicate histogram entries:\n\n $ while true; do\n echo hist:key=id.syscall:val=hitcount \u003e \\\n /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger\n cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist\n sleep 0.001\n done\n $ stress-ng --sysbadaddr $(nproc)\n\nThe warning looks as follows:\n\n[ 2911.172474] ------------[ cut here ]------------\n[ 2911.173111] Duplicates detected: 1\n[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408\n[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)\n[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1\n[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G E 6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01\n[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018\n[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.185310] sp : ffff8000a1513900\n[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001\n[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008\n[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180\n[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff\n[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8\n[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731\n[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c\n[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8\n[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000\n[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480\n[ 2911.194259] Call trace:\n[ 2911.194626] tracing_map_sort_entries+0x3e0/0x408\n[ 2911.195220] hist_show+0x124/0x800\n[ 2911.195692] seq_read_iter+0x1d4/0x4e8\n[ 2911.196193] seq_read+0xe8/0x138\n[ 2911.196638] vfs_read+0xc8/0x300\n[ 2911.197078] ksys_read+0x70/0x108\n[ 2911.197534] __arm64_sys_read+0x24/0x38\n[ 2911.198046] invoke_syscall+0x78/0x108\n[ 2911.198553] el0_svc_common.constprop.0+0xd0/0xf8\n[ 2911.199157] do_el0_svc+0x28/0x40\n[ 2911.199613] el0_svc+0x40/0x178\n[ 2911.200048] el0t_64_sync_handler+0x13c/0x158\n[ 2911.200621] el0t_64_sync+0x1a8/0x1b0\n[ 2911.201115] ---[ end trace 0000000000000000 ]---\n\nThe problem appears to be caused by CPU reordering of writes issued from\n__tracing_map_insert().\n\nThe check for the presence of an element with a given key in this\nfunction is:\n\n val = READ_ONCE(entry-\u003eval);\n if (val \u0026\u0026 keys_match(key, val-\u003ekey, map-\u003ekey_size)) ...\n\nThe write of a new entry is:\n\n elt = get_free_elt(map);\n memcpy(elt-\u003ekey, key, map-\u003ekey_size);\n entry-\u003eval = elt;\n\nThe \"memcpy(elt-\u003ekey, key, map-\u003ekey_size);\" and \"entry-\u003eval = elt;\"\nstores may become visible in the reversed order on another CPU. This\nsecond CPU might then incorrectly determine that a new key doesn\u0027t match\nan already present val-\u003ekey and subse\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tracing: Ensure visibility when inserting an element into tracing_map",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26645"
},
{
"category": "external",
"summary": "RHBZ#2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tracing: Ensure visibility when inserting an element into tracing_map"
},
{
"cve": "CVE-2024-26649",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271796"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the drm/amdgpu driver of Linux Kernel, causing null pointer dereference when attempting to load RLC (Run-Length Coding) firmware. This issue arises if the firmware has an incorrect header size, causing premature release of the firmware pointer in amdgpu_ucode_request(), subsequently attempts to use the nullified pointer result in errors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null pointer when load rlc firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26649"
},
{
"category": "external",
"summary": "RHBZ#2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: null pointer when load rlc firmware"
},
{
"cve": "CVE-2024-26665",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue occurs due to the improper handling of non-linear skbs (socket buffers) when calculating checksums for ICMPv6 PMTU error messages. This vulnerability can lead to out-of-bounds access, potentially causing memory corruption or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability, as it was already patched in the 9.4.0 release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"category": "external",
"summary": "RHBZ#2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error"
},
{
"cve": "CVE-2024-26717",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273148"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid-of: fix NULL-deref on failed power up\n\nA while back the I2C HID implementation was split in an ACPI and OF\npart, but the new OF driver never initialises the client pointer which\nis dereferenced on power-up failures.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26717"
},
{
"category": "external",
"summary": "RHBZ#2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273141"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26720"
},
{
"category": "external",
"summary": "RHBZ#2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"title": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
},
{
"cve": "CVE-2024-26769",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273180"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-fc: avoid deadlock on delete association path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26769"
},
{
"category": "external",
"summary": "RHBZ#2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26769"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmet-fc: avoid deadlock on delete association path"
},
{
"cve": "CVE-2024-26855",
"cwe": {
"id": "CWE-690",
"name": "Unchecked Return Value to NULL Pointer Dereference"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275742"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ice_bridge_setlink() function in the Linux kernel. A missing check to verify whether the nlmsg_find_attr() function returns NULL or not could lead to a NULL pointer dereference, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26855"
},
{
"category": "external",
"summary": "RHBZ#2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()"
},
{
"cve": "CVE-2024-26880",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s device-mapper (dm) component. The issue arises during internal suspend operations where the resume method is not correctly called. This issue leads to problems such as list corruption, specifically observed when running the lvm2 test suite. The problem occurs because of two consecutive calls to the origin_postsuspend function, which results in attempts to remove an entry from a list that has already been removed, triggering a crash.\nThe kernel patch resolves this issue by ensuring that the preresume and resume methods are paired correctly during internal suspend and resume cycles. This prevents the list corruption and avoids the crash. The patch has been integrated into the kernel, and users are encouraged to update their systems to the latest version to ensure this vulnerability is mitigated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: call the resume method on internal suspend",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26880"
},
{
"category": "external",
"summary": "RHBZ#2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: call the resume method on internal suspend"
},
{
"cve": "CVE-2024-26894",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275661"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26894"
},
{
"category": "external",
"summary": "RHBZ#2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2277171"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the management of inter-process communication uses AF_UNIX sockets. The issue arises from a race condition where a partially initialized socket with specific permissions carrying SCM_RIGHTS is improperly handled during garbage collection. This situation leads to an incorrect count of active sockets, potentially causing resources to remain unaccounted for and never released.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: af_unix: Fix garbage collector racing against connect()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Moderate due to the worst-case scenario resulting in a resource consumption attack. Considering this is a timing attack and is hard to replicate outside of very controlled environments, the vulnerability is not rated higher.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "RHBZ#2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"
}
],
"release_date": "2024-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "There are no known mitigations to this issue and updating to the latest Linux kernel version is recommended to address this vulnerability\u200b.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: af_unix: Fix garbage collector racing against connect()"
},
{
"cve": "CVE-2024-26939",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278220"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in drivers/gpu/drm/i915/i915_vma.c in the Linux kernel that may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915/vma: Fix UAF on destroy against retire race",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26939"
},
{
"category": "external",
"summary": "RHBZ#2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/i915/vma: Fix UAF on destroy against retire race"
},
{
"cve": "CVE-2024-27013",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036 TASK: ffff949da6f20000 CPU: 23 COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n [exception RIP: io_serial_in+20]\n RIP: ffffffff89792594 RSP: ffffa655314979e8 RFLAGS: 00000002\n RAX: ffffffff89792500 RBX: ffffffff8af428a0 RCX: 0000000000000000\n RDX: 00000000000003fd RSI: 0000000000000005 RDI: ffffffff8af428a0\n RBP: 0000000000002710 R8: 0000000000000004 R9: 000000000000000f\n R10: 0000000000000000 R11: ffffffff8acbf64f R12: 0000000000000020\n R13: ffffffff8acbf698 R14: 0000000000000058 R15: 0000000000000000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tun: limit printing rate when illegal packet received by tun dev",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27013"
},
{
"category": "external",
"summary": "RHBZ#2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tun: limit printing rate when illegal packet received by tun dev"
},
{
"cve": "CVE-2024-27042",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278447"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c in the Linux kernel. This issue may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has protection mechanisms in place against buffer overflows such as FORTIFY_SOURCE, Position Independent Executables, or Stack Smashing Protection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27042"
},
{
"category": "external",
"summary": "RHBZ#2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;"
},
{
"cve": "CVE-2024-35809",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281217"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the PCI subsystem in the Linux kernel, where runtime-idle callbacks are not always drained before a PCI driver is removed. If these callbacks are still active when the driver is removed, it could result in system instability or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "RHBZ#2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal"
},
{
"cve": "CVE-2024-35877",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281720"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "RHBZ#2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings"
},
{
"cve": "CVE-2024-35884",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281704"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35884 highlights a flaw in the Linux kernel\u0027s handling of UDP packets when Generic Receive Offload (GRO) forwarding is enabled. The issue occurs because non-tunnel UDP packets are sometimes mistakenly processed as if they belong to a tunnel. This can lead to data corruption or kernel crashes, particularly in environments with complex network configurations or when certain tunneling protocols like Geneve are used.\n\nThe kernel\u0027s processing logic for GRO and UDP packets fails to properly differentiate between tunneled and non-tunneled packets. As a result, improperly handled packets may lead to segmentation errors or system instability.\n\nThis vulnerability affects system availability and could result in crashes or data integrity issues during packet forwarding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"category": "external",
"summary": "RHBZ#2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel"
},
{
"cve": "CVE-2024-35944",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281807"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "RHBZ#2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()"
},
{
"cve": "CVE-2024-35989",
"discovery_date": "2024-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281847"
}
],
"notes": [
{
"category": "description",
"text": "This is a vulnerability in the Linux kernel\u0027s Data Movement Accelerator (DMA) engine, specifically affecting the Intel Data Streaming Accelerator (IDXD) driver. The issue arises during the removal (rmmod) of the idxd driver on systems with only one active CPU. In such scenarios, the driver\u0027s cleanup process attempts to migrate performance monitoring unit (PMU) contexts to another CPU. However, with no other CPUs available, this leads to a kernel oops\u2014a serious error causing the system to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35989"
},
{
"category": "external",
"summary": "RHBZ#2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms"
},
{
"cve": "CVE-2024-36883",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284271"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s networking subsystem in how a local user triggers a complex race condition. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix out-of-bounds access in ops_init",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36883"
},
{
"category": "external",
"summary": "RHBZ#2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix out-of-bounds access in ops_init"
},
{
"cve": "CVE-2024-36901",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284634"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 \u003c42\u003e 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS: 00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent NULL dereference in ip6_output()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36901"
},
{
"category": "external",
"summary": "RHBZ#2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent NULL dereference in ip6_output()"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284545"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 \u003c42\u003e 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS: 00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36902"
},
{
"category": "external",
"summary": "RHBZ#2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()"
},
{
"cve": "CVE-2024-36920",
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284515"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Avoid memcpy field-spanning write WARNING\n\nWhen the \"storcli2 show\" command is executed for eHBA-9600, mpi3mr driver\nprints this WARNING message:\n\n memcpy: detected field-spanning write (size 128) of single field \"bsg_reply_buf-\u003ereply_buf\" at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size 1)\n WARNING: CPU: 0 PID: 12760 at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 mpi3mr_bsg_request+0x6b12/0x7f10 [mpi3mr]\n\nThe cause of the WARN is 128 bytes memcpy to the 1 byte size array \"__u8\nreplay_buf[1]\" in the struct mpi3mr_bsg_in_reply_buf. The array is intended\nto be a flexible length array, so the WARN is a false positive.\n\nTo suppress the WARN, remove the constant number \u00271\u0027 from the array\ndeclaration and clarify that it has flexible length. Also, adjust the\nmemory allocation size to match the change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36920"
},
{
"category": "external",
"summary": "RHBZ#2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING"
},
{
"cve": "CVE-2024-36939",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284628"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet\u0027s handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname \u0027nfs\u0027\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36939"
},
{
"category": "external",
"summary": "RHBZ#2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init()."
},
{
"cve": "CVE-2024-36953",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284596"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()\n\nvgic_v2_parse_attr() is responsible for finding the vCPU that matches\nthe user-provided CPUID, which (of course) may not be valid. If the ID\nis invalid, kvm_get_vcpu_by_id() returns NULL, which isn\u0027t handled\ngracefully.\n\nSimilar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()\nactually returns something and fail the ioctl if not.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36953"
},
{
"category": "external",
"summary": "RHBZ#2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293658"
}
],
"notes": [
{
"category": "description",
"text": "A security vulnerability has been identified in the TCP networking implementation of the Linux kernel. Specifically, the dctcp_update_alpha() function is susceptible to a shift-out-of-bounds condition. This flaw could potentially be exploited to cause unexpected behavior or a denial-of-service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting this specific CWE-125: Out-of-bounds Read vulnerability, justifying a severity downgrade from Moderate to Low.\n\nThe use of baseline configurations, change control, and configuration settings within the platform enforces secure system configurations, patch management, and proper runtime settings, which helps prevent the introduction of memory handling issues through insecure defaults, unpatched components, and misconfigurations. Specifically, the use of process isolation and memory protection ensures memory integrity by isolating processes and enforcing memory protection mechanisms that limit an attacker\u0027s ability to exploit or read memory. System monitoring controls provide an additional layer of protection in the detection of anomalous behavior and unauthorized memory-related access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37356"
},
{
"category": "external",
"summary": "RHBZ#2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T"
}
],
"release_date": "2024-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha()."
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293441"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc. Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an \u0027ipv6.nd\u0027 field. However, the \u0027ipv6\u0027 is a union that shares\nthe space between \u0027nd\u0027 and \u0027ct_orig\u0027 that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it\u0027s fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine. Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn\u0027t\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38558"
},
{
"category": "external",
"summary": "RHBZ#2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6"
},
{
"cve": "CVE-2024-38559",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293440"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "RHBZ#2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated"
},
{
"cve": "CVE-2024-38570",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293423"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix potential glock use-after-free on unmount\n\nWhen a DLM lockspace is released and there ares still locks in that\nlockspace, DLM will unlock those locks automatically. Commit\nfb6791d100d1b started exploiting this behavior to speed up filesystem\nunmount: gfs2 would simply free glocks it didn\u0027t want to unlock and then\nrelease the lockspace. This didn\u0027t take the bast callbacks for\nasynchronous lock contention notifications into account, which remain\nactive until until a lock is unlocked or its lockspace is released.\n\nTo prevent those callbacks from accessing deallocated objects, put the\nglocks that should not be unlocked on the sd_dead_glocks list, release\nthe lockspace, and only then free those glocks.\n\nAs an additional measure, ignore unexpected ast and bast callbacks if\nthe receiving glock is dead.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gfs2: Fix potential glock use-after-free on unmount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity due to its localized impact. Exploitation requires specific conditions during unmount, affecting stability without extensive security risks, as it impacts only the file system\u2019s lock management on unmount.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38570"
},
{
"category": "external",
"summary": "RHBZ#2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gfs2: Fix potential glock use-after-free on unmount"
},
{
"cve": "CVE-2024-38581",
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue is due to a possible use-after-free in drivers/gpu/drm/amd/amdgpu/amdgpu_mes.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu/mes: fix use-after-free issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38581"
},
{
"category": "external",
"summary": "RHBZ#2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu/mes: fix use-after-free issue"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293273"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n first initialization.\n- Add an error check for the return value of alauda_init_media().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb-storage: alauda: Check whether the media is initialized",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38619"
},
{
"category": "external",
"summary": "RHBZ#2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: usb-storage: alauda: Check whether the media is initialized"
},
{
"cve": "CVE-2024-39471",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294313"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39471"
},
{
"category": "external",
"summary": "RHBZ#2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T"
}
],
"release_date": "2024-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds"
},
{
"cve": "CVE-2024-39499",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297471"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the event_deliver() function in the Linux kernel\u0027s VMCI component, where the issue involves a lack of sanitization for the event_data.event index controlled by user-space, which could lead to speculative information leaks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39499"
},
{
"category": "external",
"summary": "RHBZ#2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()"
},
{
"cve": "CVE-2024-39501",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297473"
}
],
"notes": [
{
"category": "description",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers: core: synchronize really_probe() and dev_uevent()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected by the Linux kernel community. Refer to the announcement: https://lore.kernel.org/linux-cve-announce/2025051047-REJECTED-95ca@gregkh/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39501"
},
{
"category": "external",
"summary": "RHBZ#2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"title": "kernel: drivers: core: synchronize really_probe() and dev_uevent()"
},
{
"cve": "CVE-2024-39506",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297478"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t octeon_droq_dispatch_pkt\n\t octeon_create_recv_info\n\t ...search in the dispatch_list...\n\t -\u003edisp_fn(rdisp-\u003erinfo, ...)\n\t lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info-\u003epage to NULL.\nSo this check looks unneeded and doesn\u0027t solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can\u0027t do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39506"
},
{
"category": "external",
"summary": "RHBZ#2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet"
},
{
"cve": "CVE-2024-40901",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297706"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40901"
},
{
"category": "external",
"summary": "RHBZ#2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory"
},
{
"cve": "CVE-2024-40904",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver\u0027s immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#2: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#3: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#4: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#5: 98% system,\t 1% softirq,\t 3% hardirq,\t 0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [\u003cffff800080020de8\u003e] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls. Therefore we replace them with\ndev_err_ratelimited().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40904"
},
{
"category": "external",
"summary": "RHBZ#2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages"
},
{
"cve": "CVE-2024-40911",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297495"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Lock wiphy in cfg80211_get_station\n\nWiphy should be locked before calling rdev_get_station() (see lockdep\nassert in ieee80211_get_station()).\n\nThis fixes the following kernel NULL dereference:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n ESR = 0x0000000096000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000\n [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000\n Internal error: Oops: 0000000096000006 [#1] SMP\n Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath\n CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705\n Hardware name: RPT (r1) (DT)\n Workqueue: bat_events batadv_v_elp_throughput_metric_update\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n lr : sta_set_sinfo+0xcc/0xbd4\n sp : ffff000007b43ad0\n x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98\n x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000\n x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc\n x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000\n x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d\n x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e\n x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000\n x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000\n x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90\n x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000\n Call trace:\n ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n sta_set_sinfo+0xcc/0xbd4\n ieee80211_get_station+0x2c/0x44\n cfg80211_get_station+0x80/0x154\n batadv_v_elp_get_throughput+0x138/0x1fc\n batadv_v_elp_throughput_metric_update+0x1c/0xa4\n process_one_work+0x1ec/0x414\n worker_thread+0x70/0x46c\n kthread+0xdc/0xe0\n ret_from_fork+0x10/0x20\n Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)\n\nThis happens because STA has time to disconnect and reconnect before\nbatadv_v_elp_throughput_metric_update() delayed work gets scheduled. In\nthis situation, ath10k_sta_state() can be in the middle of resetting\narsta data when the work queue get chance to be scheduled and ends up\naccessing it. Locking wiphy prevents that.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40911"
},
{
"category": "external",
"summary": "RHBZ#2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station"
},
{
"cve": "CVE-2024-40912",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297496"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta-\u003eps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta-\u003eps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu: (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G W 6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n queued_spin_lock_slowpath+0x58/0x2d0\n ieee80211_tx+0x80/0x12c\n ieee80211_tx_pending+0x110/0x278\n tasklet_action_common.constprop.0+0x10c/0x144\n tasklet_action+0x20/0x28\n _stext+0x11c/0x284\n ____do_softirq+0xc/0x14\n call_on_irq_stack+0x24/0x34\n do_softirq_own_stack+0x18/0x20\n do_softirq+0x74/0x7c\n __local_bh_enable_ip+0xa0/0xa4\n _ieee80211_wake_txqs+0x3b0/0x4b8\n __ieee80211_wake_queue+0x12c/0x168\n ieee80211_add_pending_skbs+0xec/0x138\n ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n ieee80211_mps_sta_status_update+0x18/0x24\n sta_apply_parameters+0x3bc/0x4c0\n ieee80211_change_station+0x1b8/0x2dc\n nl80211_set_station+0x444/0x49c\n genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n genl_rcv_msg+0x1b0/0x244\n netlink_rcv_skb+0x38/0x10c\n genl_rcv+0x34/0x48\n netlink_unicast+0x254/0x2bc\n netlink_sendmsg+0x190/0x3b4\n ____sys_sendmsg+0x1e8/0x218\n ___sys_sendmsg+0x68/0x8c\n __sys_sendmsg+0x44/0x84\n __arm64_sys_sendmsg+0x20/0x28\n do_el0_svc+0x6c/0xe8\n el0_svc+0x14/0x48\n el0t_64_sync_handler+0xb0/0xb4\n el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40912"
},
{
"category": "external",
"summary": "RHBZ#2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()"
},
{
"cve": "CVE-2024-40929",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297513"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40929"
},
{
"category": "external",
"summary": "RHBZ#2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids"
},
{
"cve": "CVE-2024-40931",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297515"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s match component in the initialization of the snd_una variable while establishing a connection. The issue arises when retransmission occurs after a fallback, leaving the snd_una sequence number uninitialized, leading to unpredictable behavior and potential denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: ensure snd_una is properly initialized on connect",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. \n\nAdditional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based denial of service (DoS) attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40931"
},
{
"category": "external",
"summary": "RHBZ#2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: ensure snd_una is properly initialized on connect"
},
{
"cve": "CVE-2024-40941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40941"
},
{
"category": "external",
"summary": "RHBZ#2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation"
},
{
"cve": "CVE-2024-40954",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297538"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n * attaching an fentry probe to __sock_release() and the probe calling the\n bpf_get_socket_cookie() helper\n * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: do not leave a dangling sk pointer, when socket creation fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40954"
},
{
"category": "external",
"summary": "RHBZ#2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: do not leave a dangling sk pointer, when socket creation fails"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297542"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s netns in the get_net_ns() function. This vulnerability occurs when a network namespace reference count is zero, leading to a use-after-free condition that can trigger a kernel panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netns: Make get_net_ns() handle zero refcount net",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40958"
},
{
"category": "external",
"summary": "RHBZ#2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netns: Make get_net_ns() handle zero refcount net"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297543"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40959"
},
{
"category": "external",
"summary": "RHBZ#2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297544"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s IPv6 routing component, where a NULL dereference occurs in the rt6_probe() function. This issue happens when the function attempts to access a resource without confirming its availability, leading to potential crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of NULL pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies NULL dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. \n\nAdditionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40960"
},
{
"category": "external",
"summary": "RHBZ#2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()"
},
{
"cve": "CVE-2024-40972",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297556"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: do not create EA inode under buffer lock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40972"
},
{
"category": "external",
"summary": "RHBZ#2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: do not create EA inode under buffer lock"
},
{
"cve": "CVE-2024-40977",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297561"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mt76 driver for the mt7921s chip, where a potential deadlock could occur during chip recovery. This situation arises when the kernel worker reset_work holds a lock while waiting for the stat_worker thread, which is simultaneously waiting for the same lock to be released, which leads to hung tasks and may even result in device reboots.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40977"
},
{
"category": "external",
"summary": "RHBZ#2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery"
},
{
"cve": "CVE-2024-40978",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297562"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedi: Fix crash while reading debugfs attribute",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40978"
},
{
"category": "external",
"summary": "RHBZ#2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedi: Fix crash while reading debugfs attribute"
},
{
"cve": "CVE-2024-40988",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297572"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s DRM/Radeon driver, specifically in the sumo_vid_mapping_entry within the kv_dpm.c file. Insufficient bounds checking can lead to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-787: Out-of-bounds Write vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software settings, while least functionality reduces the attack surface by disabling unauthorized services and ports. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code exploiting out-of-bounds write vulnerabilities, using mechanisms such as file integrity monitoring and patch management. \n\nRobust input validation and error handling ensure all user inputs are thoroughly validated, preventing instability, data exposure, or privilege escalation. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against out-of-bounds write exploits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40988"
},
{
"category": "external",
"summary": "RHBZ#2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c"
},
{
"cve": "CVE-2024-40989",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297573"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s KVM for ARM64 within the vgic-init.c, vgic-mmio-v3.c, and vgic.h files. The virtual vCPUs may retain dangling pointers in a redistributor region after they have been torn down, leading to potential memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40989"
},
{
"category": "external",
"summary": "RHBZ#2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297579"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "RHBZ#2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()"
},
{
"cve": "CVE-2024-40997",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297581"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: fix memory leak on CPU EPP exit\n\nThe cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is\nnot freed in the analogous exit function, so fix that.\n\n[ rjw: Subject and changelog edits ]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40997"
},
{
"category": "external",
"summary": "RHBZ#2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40997"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit"
},
{
"cve": "CVE-2024-40998",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297582"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs-\u003elock:\n\next4_fill_super\n ext4_register_sysfs\n // sysfs registered msg_ratelimit_interval_ms\n // Other processes modify rs-\u003einterval to\n // non-zero via msg_ratelimit_interval_ms\n ext4_orphan_cleanup\n ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n __ext4_msg\n ___ratelimit(\u0026(EXT4_SB(sb)-\u003es_msg_ratelimit_state)\n if (!rs-\u003einterval) // do nothing if interval is 0\n return 1;\n raw_spin_trylock_irqsave(\u0026rs-\u003elock, flags)\n raw_spin_trylock(lock)\n _raw_spin_trylock\n __raw_spin_trylock\n spin_acquire(\u0026lock-\u003edep_map, 0, 1, _RET_IP_)\n lock_acquire\n __lock_acquire\n register_lock_class\n assign_lock_key\n dump_stack();\n ratelimit_state_init(\u0026sbi-\u003es_msg_ratelimit_state, 5 * HZ, 10);\n raw_spin_lock_init(\u0026rs-\u003elock);\n // init rs-\u003elock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs-\u003elock, so it is possible to change rs-\u003einterval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs-\u003elock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs-\u003elock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40998"
},
{
"category": "external",
"summary": "RHBZ#2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297589"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n\u003csnip\u003e\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n\u003csnip\u003e\n\tvalue changed: 0x0000000a -\u003e 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi-\u003epoll_owner\nnon atomically. The -\u003epoll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netpoll: Fix race condition in netpoll_owner_active",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41005"
},
{
"category": "external",
"summary": "RHBZ#2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netpoll: Fix race condition in netpoll_owner_active"
},
{
"cve": "CVE-2024-41007",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297909"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the tcp_retransmit_timer function in the Linux kernel\u0027s TCP implementation. This issue occurs when a TCP socket uses TCP_USER_TIMEOUT and the peer\u0027s window retracts to zero, leading to excessive retransmission of packets every two milliseconds for up to four minutes after the timeout, which can result in network congestion and performance degradation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: avoid too many retransmit packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41007"
},
{
"category": "external",
"summary": "RHBZ#2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: avoid too many retransmit packets"
},
{
"cve": "CVE-2024-41008",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298079"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm-\u003etask_info handling\n\nThis patch changes the handling and lifecycle of vm-\u003etask_info object.\nThe major changes are:\n- vm-\u003etask_info is a dynamically allocated ptr now, and its uasge is\n reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n - amdgpu_vm_get_task_info: reference counts up task_info before\n returning this info\n - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm-\u003etask_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n - Fix wrong indentation\n - No debug message for -ENOMEM\n - Add NULL check for task_info\n - Do not duplicate the debug messages (ti vs no ti)\n - Get first reference of task_info in vm_init(), put last\n in vm_fini()\n\nV4: Fixed review comments from Felix\n - fix double reference increment in create_task_info\n - change amdgpu_vm_get_task_info_pasid\n - additional changes in amdgpu_gem.c while porting",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41008"
},
{
"category": "external",
"summary": "RHBZ#2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling"
},
{
"cve": "CVE-2024-41012",
"discovery_date": "2024-07-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299452"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Remove locks reliably when fcntl/close race is detected\n\nWhen fcntl_setlk() races with close(), it removes the created lock with\ndo_lock_file_wait().\nHowever, LSMs can allow the first do_lock_file_wait() that created the lock\nwhile denying the second do_lock_file_wait() that tries to remove the lock.\nSeparately, posix_lock_file() could also fail to\nremove a lock due to GFP_KERNEL allocation failure (when splitting a range\nin the middle).\n\nAfter the bug has been triggered, use-after-free reads will occur in\nlock_get_status() when userspace reads /proc/locks. This can likely be used\nto read arbitrary kernel memory, but can\u0027t corrupt kernel memory.\n\nFix it by calling locks_remove_posix() instead, which is designed to\nreliably get rid of POSIX locks associated with the given file and\nfiles_struct and is also used by filp_flush().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filelock: Remove locks reliably when fcntl/close race is detected",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41012"
},
{
"category": "external",
"summary": "RHBZ#2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T"
}
],
"release_date": "2024-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: filelock: Remove locks reliably when fcntl/close race is detected"
},
{
"cve": "CVE-2024-41013",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300296"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don\u0027t walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don\u0027t stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup-\u003elength to dup-\u003elength-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41013"
},
{
"category": "external",
"summary": "RHBZ#2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block"
},
{
"cve": "CVE-2024-41014",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300297"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified within the Linux kernel\u0027s xlog_recover_process_data() function. Specifically, the function lacks proper bounds checking on the space allocated for the fixed members of the xlog_op_header structure during log record processing. This omission can lead to an out-of-bounds memory access.\n\nThe potential impact of this flaw includes unpredictable system behavior and kernel-level crashes. Successful exploitation could disrupt system availability and potentially be leveraged for further malicious activities, depending on the context and any subsequent vulnerabilities exposed by the undefined behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: add bounds checking to xlog_recover_process_data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting this CWE-125 (Out-of-bounds Read) vulnerability, justifying a severity downgrade from Moderate to Low.\n\nThe use of baseline configurations, change control, and configuration settings within the platform enforces secure system configurations, patch management, and proper runtime settings, which helps prevent the introduction of memory handling issues through insecure defaults, unpatched components, and misconfigurations. Specifically, the use of process isolation and memory protection ensures memory integrity by isolating processes and enforcing memory protection mechanisms that limit an attacker\u0027s ability to exploit or read memory. System monitoring controls provide an additional layer of protection in the detection of anomalous behavior and unauthorized memory-related access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41014"
},
{
"category": "external",
"summary": "RHBZ#2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: add bounds checking to xlog_recover_process_data"
},
{
"cve": "CVE-2024-41035",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300402"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the usb_parse_endpoint() function in the Linux kernel\u0027s usb drivers, where improper handling of the reserved bits in an endpoint descriptor\u0027s bEndpointAddress field can lead to confusion in the endpoint_is_duplicate() routine in config.c. This will erroneously treat the same endpoint descriptors as distinct, given that the reserved bits are not properly cleared. This can potentially lead to unexpected behavior from connected USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41035"
},
{
"category": "external",
"summary": "RHBZ#2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor"
},
{
"cve": "CVE-2024-41038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300407"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41038"
},
{
"category": "external",
"summary": "RHBZ#2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers"
},
{
"cve": "CVE-2024-41039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300408"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s firmware driver cs_dsp.c, where a buffer overflow is possible in the wmfw header due to insufficient buffer size checks. The issue stems from the size of one of the structs that the code checks, the wmfw_adsp?_sizes struct, which can vary depending on whether the firmware used is ADSP1 or ADSP2 and Halo Core. In the second case, the wmfw_adsp2_sizes struct is 4 bytes longer, which can cause a buffer overflow, potentially leading to undefined behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of moderate severity because successful exploitation of this vulnerability would require elevated privileges to be able to access/modify the firmware loading mechanism. It also presents an elevated attack complexity given that the attacker requires knowledge of the Cirrus Logic DSP firmware to be able to craft special firmware to exploit the buffer overflow. Finally, depending on when the vulnerability is executed (ex. at boot time or during runtime) the impact on the system might change drastically; in one scenario it might cause a kernel crash in another just the audio driver might stop working.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41039"
},
{
"category": "external",
"summary": "RHBZ#2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header"
},
{
"cve": "CVE-2024-41040",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300409"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the net/sshd tcf_ct_flow_table_process_conn of the Linux kernel. This flaw allows an attacker with a crafted payload to induce a system crash, resulting in a loss of system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: Fix UAF when resolving a clash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Because exploitation of this flaw requires an attacker to have sufficient access to a system to generate significant amounts of spurious traffic, and because an attacker has very limited control over the consequences of the data corruption caused by this vulnerability, Red Hat assesses its impact as Moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-416: Use After Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure that only authorized users and roles can execute or modify code. Red Hat also enforces least functionality, enabling only essential features, services, and ports. Hardening guidelines ensure the most restrictive settings required for operations, while baseline configurations enforce safe memory allocation and deallocation practices to reduce the risk of use-after-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code and provide real-time visibility into memory usage, lowering the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents a compromised process from accessing memory freed by another, containing potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41040"
},
{
"category": "external",
"summary": "RHBZ#2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: Fix UAF when resolving a clash"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300410"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb-\u003edestructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet\u0027s apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe \u003c0f\u003e 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"category": "external",
"summary": "RHBZ#2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppp: reject claimed-as-LCP but actually malformed packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "RHBZ#2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppp: reject claimed-as-LCP but actually malformed packets"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300429"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms-\u003eusage\" to fix a race with section_deactivate() where\nms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference. We need to check its value before\ndereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41055"
},
{
"category": "external",
"summary": "RHBZ#2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()"
},
{
"cve": "CVE-2024-41056",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300430"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun flaw exists in the Linux kernel when the strlen function is used on name fields in V1 wmfw files. This issue results in a loss of system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-787: Out-of-bounds Write vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software settings, while least functionality reduces the attack surface by disabling unauthorized services and ports. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code exploiting out-of-bounds write vulnerabilities, using mechanisms such as file integrity monitoring and patch management. Robust input validation and error handling ensure all user inputs are thoroughly validated, preventing instability, data exposure, or privilege escalation. \n\nFinally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against out-of-bounds write exploits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41056"
},
{
"category": "external",
"summary": "RHBZ#2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files"
},
{
"cve": "CVE-2024-41060",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300434"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41060"
},
{
"category": "external",
"summary": "RHBZ#2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it"
},
{
"cve": "CVE-2024-41071",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300448"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "RHBZ#2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "There are no mitigations for the flaw. Please update your system for fixes.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"title": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing"
},
{
"cve": "CVE-2024-41076",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the nfs4_set_security_label() in the Linux kernel, where the function fails to free the nfs_fattr attribute before exiting, leaving said memory allocation present. As the nfs4_set_security_label() is called repeatedly over time, this may lead to memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of low severity as the only effect of this vulnerability is to lead to memory leakage which, called repeatedly over time, may lead to memory exhaustion and impact the system\u0027s performance. Given that the max xattr size on NFSv4 systems is quite small (typically 1KB; and security xattrs tend to be significantly smaller) it is safe to assume that a system\u0027s availability being impacted solely from memory exhaustion caused by this vulnerability is unlikely and thus its impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41076"
},
{
"category": "external",
"summary": "RHBZ#2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label"
},
{
"cve": "CVE-2024-41090",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299240"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tap: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "RHBZ#2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tap: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41091",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299336"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tun: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41091"
},
{
"category": "external",
"summary": "RHBZ#2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tun: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41097",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300492"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41097"
},
{
"category": "external",
"summary": "RHBZ#2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()"
},
{
"cve": "CVE-2024-42084",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300533"
}
],
"notes": [
{
"category": "description",
"text": "An unexpected file truncate flaw was found when opening files with specific parameters in the Linux kernel\u0027s file-system. This vulnerability allows a local user to corrupt specific files when having access to these files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ftruncate: pass a signed offset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only occurs in compact mode on 64-bit architectures.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42084"
},
{
"category": "external",
"summary": "RHBZ#2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ftruncate: pass a signed offset"
},
{
"cve": "CVE-2024-42090",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300552"
}
],
"notes": [
{
"category": "description",
"text": "A deadlock flaw was found in the Linux kernel\u2019s pinctrl subsystem. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No known reproducer for this issue. It can happen due to some complex preconditions and in-error path handling.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-833: Deadlock vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform\u0027s orchestration capabilities, including automated pod restarts, liveness/readiness probes, and health checks, help to identify and remediate stuck or non-responsive processes caused by deadlocks. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention, which helps detect and alert of any deadlocking conditions. Additionally, process isolation ensures that compromised components are contained within the originating process, preventing them from affecting other processes or the system as a whole.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42090"
},
{
"category": "external",
"summary": "RHBZ#2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER"
},
{
"cve": "CVE-2024-42096",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300713"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86: stop playing stack games in profile_pc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42096"
},
{
"category": "external",
"summary": "RHBZ#2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: x86: stop playing stack games in profile_pc()"
},
{
"cve": "CVE-2024-42114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301477"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the cfg80211 component in the Linux kernel, where a lack of proper range validation applied to the NL80211_ATTR_TXQ_QUANTUM can lead to a scenario where the userspace passes an extremely high value that the kernel is not designed to handle efficiently (ex. 2^31). This can cause soft lockups and system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to effectively trigger this vulnerability require the user to be able to craft and send a Netlink message with the NL80211_ATTR_TXQ_QUANTUM parameter set to an abnormally high value. The permissions necessary to set this value would require CAP_NET_ADMIN.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42114"
},
{
"category": "external",
"summary": "RHBZ#2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values"
},
{
"cve": "CVE-2024-42124",
"cwe": {
"id": "CWE-372",
"name": "Incomplete Internal State Distinction"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301489"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42124"
},
{
"category": "external",
"summary": "RHBZ#2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible"
},
{
"cve": "CVE-2024-42131",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s memory management subsystem where a lack of proper size checks on dirty limits can lead to situations where large dirty limits end up being larger than 32-bits, resulting in potential overflows and divisions by 0. This can cause memory corruption, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: avoid overflows in dirty throttling logic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to exploit this vulnerability are high, as it requires a user to have elevated permissions to set the dirty page limits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42131"
},
{
"category": "external",
"summary": "RHBZ#2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: avoid overflows in dirty throttling logic"
},
{
"cve": "CVE-2024-42152",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301519"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s nvme driver. A lack of proper checks can lead to a race condition during the destruction of a queue pair when a controller is being established. This issue can lead to system instability or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-404: Improper Resource Shutdown or Release vulnerability and downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software configurations, while least functionality reduces the attack surface and mitigates the risk of resource exhaustion from data leaks. \n\nThe environment incorporates malicious code protections such as IDS/IPS and antimalware solutions to detect threats and provide real-time visibility into resource usage, reducing the likelihood of resource leaks that could cause system instability. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, supporting the detection of abnormal resource usage patterns. Static code analysis and peer reviews enforce strong input validation and error handling to minimize the risk of denial-of-service (DoS) attacks. Lastly, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42152"
},
{
"category": "external",
"summary": "RHBZ#2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s tcp_metrics.c, where insufficient validation of the length of the source address for TCP metrics could lead to incorrect memory read (out of boundary read).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp_metrics: validate source addr length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact level is limited, because:\n1. Missed check existed before and worked correctly (because by default it worked for int32 value, even if it was not specified exactly).\n2. Even if for some specific case fail could happen, still it can lead only to incorrect memory read.\n3. Even if memory corruption happens, it should not lead to anything apart from incorrect tcp-ip statistics output to the local user.\n4. This bug is restricted to local as netlink is configured to be local only out of the box.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"category": "external",
"summary": "RHBZ#2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp_metrics: validate source addr length"
},
{
"cve": "CVE-2024-42226",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301544"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB\n\nSome transfer events don\u0027t always point to a TRB, and consequently don\u0027t\nhave a endpoint ring. In these cases, function handle_tx_event() should\nnot proceed, because if \u0027ep-\u003eskip\u0027 is set, the pointer to the endpoint\nring is used.\n\nTo prevent a potential failure and make the code logical, return after\nchecking the completion code for a Transfer event without TRBs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42226"
},
{
"category": "external",
"summary": "RHBZ#2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB"
},
{
"cve": "CVE-2024-42228",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303077"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s amdgpu driver in the amdgpu_vce_ring_parse_cs() function where the size variable is initialized with a pointer that may not be properly set before use. This issue could lead to unpredictable behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of Moderate severity with a low impact on confidentiality given that the component primarily impacted by this vulnerability is an AMD GPU driver, which is used mainly for rendering graphics on the system. As such, a successful exploit of this vulnerability would likely not result in any sensitive information being leaked.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42228"
},
{
"category": "external",
"summary": "RHBZ#2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc"
},
{
"cve": "CVE-2024-42237",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303505"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Validate payload length before processing block\n\nMove the payload length check in cs_dsp_load() and cs_dsp_coeff_load()\nto be done before the block is processed.\n\nThe check that the length of a block payload does not exceed the number\nof remaining bytes in the firwmware file buffer was being done near the\nend of the loop iteration. However, some code before that check used the\nlength field without validating it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Validate payload length before processing block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42237"
},
{
"category": "external",
"summary": "RHBZ#2303505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: cs_dsp: Validate payload length before processing block"
},
{
"cve": "CVE-2024-42238",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303506"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. No error was returned from the cs_dsp_power_up() function if a block header is longer than the amount of data left in the file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Return error if block header overflows file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42238"
},
{
"category": "external",
"summary": "RHBZ#2303506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Return error if block header overflows file"
},
{
"cve": "CVE-2024-42240",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303508"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set, then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler (exc_debug_kernel()) to issue a warning that results in a software crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42240"
},
{
"category": "external",
"summary": "RHBZ#2303508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation"
},
{
"cve": "CVE-2024-42246",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303514"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s bpf programs. Under certain conditions, when the kernel attempts to initiate a network connection using the kernel_connect function, it can return a value that causes the cx_tcp_setup_socket function to loop. This issue can lead to continuous data writing to the Syslog, filling up the available space and causing the kernel to freeze and become unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to ensure the most restrictive setting needed for operational requirements. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, enabling capabilities like excessive CPU usage, long execution times, or processes consuming abnormal amounts of memory. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing infinite loops caused by malformed or unexpected input, such as unbounded user input or unexpected null values that cause loops to never terminate. In the event of successful exploitation, process isolation limits the effect of an infinite loop to a single process rather than allowing it to consume all system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42246"
},
{
"category": "external",
"summary": "RHBZ#2303514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket"
},
{
"cve": "CVE-2024-42322",
"discovery_date": "2024-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305467"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: properly dereference pe in ip_vs_add_service\n\nUse pe directly to resolve sparse warning:\n\n net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipvs: properly dereference pe in ip_vs_add_service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42322"
},
{
"category": "external",
"summary": "RHBZ#2305467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T"
}
],
"release_date": "2024-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipvs: properly dereference pe in ip_vs_add_service"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-08-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306365"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevres: Fix memory leakage caused by driver API devm_free_percpu()\n\nIt will cause memory leakage when use driver API devm_free_percpu()\nto free memory allocated by devm_alloc_percpu(), fixed by using\ndevres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-43871"
},
{
"category": "external",
"summary": "RHBZ#2306365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-43871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43871"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T"
}
],
"release_date": "2024-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()"
}
]
}
RHSA-2024_7001
Vulnerability from csaf_redhat - Published: 2024-09-24 00:40 - Updated: 2024-12-11 21:53Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. \nSecurity Fix(es):\n\n CVE-2023-6040 CVE-2024-26595 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52817 CVE-2023-52840 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7001",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7001.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-12-11T21:53:17+00:00",
"generator": {
"date": "2024-12-11T21:53:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:7001",
"initial_release_date": "2024-09-24T00:40:51+00:00",
"revision_history": [
{
"date": "2024-09-24T00:40:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T00:40:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-11T21:53:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product_id": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-553.22.1.rt7.363.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-553.22.1.rt7.363.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "NFV-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"relates_to_product_reference": "RT-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46984",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266750"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to -\u003ebio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx\u0027s than the first one (i.e., if\nctx-\u003eindex_hw[hctx-\u003etype] \u003e hctx-\u003enr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type \u0027long unsigned int [128]\u0027\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n-\u003ebio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kyber: fix out of bounds access when preempted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46984"
},
{
"category": "external",
"summary": "RHBZ#2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: kyber: fix out of bounds access when preempted"
},
{
"cve": "CVE-2021-47097",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267925"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) stack memory access flaw was found in elantech_change_report_id in drivers/input/mouse/elantech.c in the Linux kernel\u2019s elantech module. This flaw allows a local attacker to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47097"
},
{
"category": "external",
"summary": "RHBZ#2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()"
},
{
"cve": "CVE-2021-47101",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267916"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nasix: fix uninit-value in asix_mdio_read()\n\nasix_read_cmd() may read less than sizeof(smsr) bytes and in this case\nsmsr will be uninitialized.\n\nFail log:\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\nBUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\n asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: asix: fix uninit-value in asix_mdio_read()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47101"
},
{
"category": "external",
"summary": "RHBZ#2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: asix: fix uninit-value in asix_mdio_read()"
},
{
"cve": "CVE-2021-47287",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282511"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47287"
},
{
"category": "external",
"summary": "RHBZ#2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail"
},
{
"cve": "CVE-2021-47289",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282508"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: fix NULL pointer dereference\n\nCommit 71f642833284 (\"ACPI: utils: Fix reference counting in\nfor_each_acpi_dev_match()\") started doing \"acpi_dev_put()\" on a pointer\nthat was possibly NULL. That fails miserably, because that helper\ninline function is not set up to handle that case.\n\nJust make acpi_dev_put() silently accept a NULL pointer, rather than\ncalling down to put_device() with an invalid offset off that NULL\npointer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: fix NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47289"
},
{
"category": "external",
"summary": "RHBZ#2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ACPI: fix NULL pointer dereference"
},
{
"cve": "CVE-2021-47321",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282440"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the del_timer() function in the Linux kernel\u0027s watchdog driver. This issue occurs because the function does not wait for the timer handler to finish, which may lead to a situation where the handler runs after the driver that has been removed, causing a use-after-free issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue does not allow unauthorized access or data leakage, but it poses a risk of system instability and crashes. The potential for a use-after-free condition can disrupt normal operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "RHBZ#2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()"
},
{
"cve": "CVE-2021-47338",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282422"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s fbmem subsystem. This issue arises when the system attempts to delete a video mode that is still in use, leading to potential use-after-free errors. This improper handling can result in system crashes or undefined behavior when accessing freed memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fbmem: Do not delete the mode that is still in use",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue affects system reliability by potentially causing errors when video modes are incorrectly managed, but it does not compromise the system\u0027s overall security posture or data integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47338"
},
{
"category": "external",
"summary": "RHBZ#2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47338",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fbmem: Do not delete the mode that is still in use"
},
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47383",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282357"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tty: Fix out-of-bound vmalloc access in imageblit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can lead to system crashes by accessing invalid memory addresses, it does not pose a direct threat to data security or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "RHBZ#2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tty: Fix out-of-bound vmalloc access in imageblit"
},
{
"cve": "CVE-2021-47384",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282356"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp \u0026 0x08) \u0026\u0026 (!(tmp \u0026 0x80)) \u0026\u0026 ((tmp \u0026 0x7) == ((tmp \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the impact is limited to system stability rather than unauthorized access or data exposure.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"category": "external",
"summary": "RHBZ#2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47385",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282355"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val \u0026 0x08) \u0026\u0026 (!(val \u0026 0x80)) \u0026\u0026 ((val \u0026 0x7) == ((val \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can cause crashes and operational disruptions, it does not expose sensitive information or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47385"
},
{
"category": "external",
"summary": "RHBZ#2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47386",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282354"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val \u0026 0x08) \u0026\u0026 (!(val \u0026 0x80)) \u0026\u0026 ((val \u0026 0x7) == ((val \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the risk is linked to system crashes or unexpected behavior, which can disrupt normal operations but does not directly compromise sensitive data or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47386"
},
{
"category": "external",
"summary": "RHBZ#2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47393",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282345"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs\n\nFan speed minimum can be enforced from sysfs. For example, setting\ncurrent fan speed to 20 is used to enforce fan speed to be at 100%\nspeed, 19 - to be not below 90% speed, etcetera. This feature provides\nability to limit fan speed according to some system wise\nconsiderations, like absence of some replaceable units or high system\nambient temperature.\n\nRequest for changing fan minimum speed is configuration request and can\nbe set only through \u0027sysfs\u0027 write procedure. In this situation value of\nargument \u0027state\u0027 is above nominal fan speed maximum.\n\nReturn non-zero code in this case to avoid\nthermal_cooling_device_stats_update() call, because in this case\nstatistics update violates thermal statistics table range.\nThe issues is observed in case kernel is configured with option\nCONFIG_THERMAL_STATISTICS.\n\nHere is the trace from KASAN:\n[ 159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444\n[ 159.545625] Call Trace:\n[ 159.548366] dump_stack+0x92/0xc1\n[ 159.552084] ? thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.635869] thermal_zone_device_update+0x345/0x780\n[ 159.688711] thermal_zone_device_set_mode+0x7d/0xc0\n[ 159.694174] mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]\n[ 159.700972] ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]\n[ 159.731827] mlxsw_thermal_init+0x763/0x880 [mlxsw_core]\n[ 160.070233] RIP: 0033:0x7fd995909970\n[ 160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ..\n[ 160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970\n[ 160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001\n[ 160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700\n[ 160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013\n[ 160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013\n[ 160.143671]\n[ 160.145338] Allocated by task 2924:\n[ 160.149242] kasan_save_stack+0x19/0x40\n[ 160.153541] __kasan_kmalloc+0x7f/0xa0\n[ 160.157743] __kmalloc+0x1a2/0x2b0\n[ 160.161552] thermal_cooling_device_setup_sysfs+0xf9/0x1a0\n[ 160.167687] __thermal_cooling_device_register+0x1b5/0x500\n[ 160.173833] devm_thermal_of_cooling_device_register+0x60/0xa0\n[ 160.180356] mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]\n[ 160.248140]\n[ 160.249807] The buggy address belongs to the object at ffff888116163400\n[ 160.249807] which belongs to the cache kmalloc-1k of size 1024\n[ 160.263814] The buggy address is located 64 bytes to the right of\n[ 160.263814] 1024-byte region [ffff888116163400, ffff888116163800)\n[ 160.277536] The buggy address belongs to the page:\n[ 160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160\n[ 160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0\n[ 160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)\n[ 160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0\n[ 160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000\n[ 160.327033] page dumped because: kasan: bad access detected\n[ 160.333270]\n[ 160.334937] Memory state around the buggy address:\n[ 160.356469] \u003effff888116163800: fc ..",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can disrupt system operation by causing crashes or unpredictable behaviour under specific conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47393"
},
{
"category": "external",
"summary": "RHBZ#2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs"
},
{
"cve": "CVE-2021-47412",
"cwe": {
"id": "CWE-388",
"name": "CWE-388"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282324"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel, where improper handling of block I/O requests when a block I/O request (bio) is not tracked, the kernel erroneously calls the rq_qos_ops-\u003edone_bio function, potentially leading to use-after-free issues. This situation can occurr when the request queue is accessed after it has been freed, resulting in possible kernel panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity, as the issue can cause kernel panics, leading to system crashes. However, it does not affect data confidentiality or integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47412"
},
{
"category": "external",
"summary": "RHBZ#2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked"
},
{
"cve": "CVE-2021-47432",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282366"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Don\u0027t overflow in peek()\n\nWhen we started spreading new inode numbers throughout most of the 64\nbit inode space, that triggered some corner case bugs, in particular\nsome integer overflows related to the radix tree code. Oops.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47432"
},
{
"category": "external",
"summary": "RHBZ#2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()"
},
{
"cve": "CVE-2021-47441",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282851"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 \u003e /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003effff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47441"
},
{
"category": "external",
"summary": "RHBZ#2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses"
},
{
"cve": "CVE-2021-47455",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282903"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n hex dump (first 8 bytes):\n 70 74 70 30 00 00 00 00 ptp0....\n backtrace:\n [\u003c00000000312ed458\u003e] __kmalloc_track_caller+0x19f/0x3a0\n [\u003c0000000079f6e2ff\u003e] kvasprintf+0xb5/0x150\n [\u003c0000000026aae54f\u003e] kvasprintf_const+0x60/0x190\n [\u003c00000000f323a5f7\u003e] kobject_set_name_vargs+0x56/0x150\n [\u003c000000004e35abdd\u003e] dev_set_name+0xc0/0x100\n [\u003c00000000f20cfe25\u003e] ptp_clock_register+0x9f4/0xd30 [ptp]\n [\u003c000000008bb9f0de\u003e] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ptp: Fix possible memory leak in ptp_clock_register()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47455"
},
{
"category": "external",
"summary": "RHBZ#2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47455",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ptp: Fix possible memory leak in ptp_clock_register()"
},
{
"cve": "CVE-2021-47466",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282890"
}
],
"notes": [
{
"category": "description",
"text": "A potential memory leak was found in the Linux kernel, in kmem_cache_open(). This issue may lead to compromised confidentiality and availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47466"
},
{
"category": "external",
"summary": "RHBZ#2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()"
},
{
"cve": "CVE-2021-47497",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282918"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "RHBZ#2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells"
},
{
"cve": "CVE-2021-47527",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283424"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: core: fix transmit-buffer reset and memleak\n\nCommit 761ed4a94582 (\"tty: serial_core: convert uart_close to use\ntty_port_close\") converted serial core to use tty_port_close() but\nfailed to notice that the transmit buffer still needs to be freed on\nfinal close.\n\nNot freeing the transmit buffer means that the buffer is no longer\ncleared on next open so that any ioctl() waiting for the buffer to drain\nmight wait indefinitely (e.g. on termios changes) or that stale data can\nend up being transmitted in case tx is restarted.\n\nFurthermore, the buffer of any port that has been opened would leak on\ndriver unbind.\n\nNote that the port lock is held when clearing the buffer pointer due to\nthe ldisc race worked around by commit a5ba1d95e46e (\"uart: fix race\nbetween uart_put_char() and uart_shutdown()\").\n\nAlso note that the tty-port shutdown() callback is not called for\nconsole ports so it is not strictly necessary to free the buffer page\nafter releasing the lock (cf. d72402145ace (\"tty/serial: do not free\ntrasnmit buffer page under port lock\")).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: serial: core: fix transmit-buffer reset and memleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47527"
},
{
"category": "external",
"summary": "RHBZ#2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: serial: core: fix transmit-buffer reset and memleak"
},
{
"cve": "CVE-2021-47560",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283389"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"category": "external",
"summary": "RHBZ#2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
},
{
"cve": "CVE-2021-47582",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293247"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value. If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0 state:D stack:23192 pid: 8700 ppid: 8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs\u0027s calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47582"
},
{
"category": "external",
"summary": "RHBZ#2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable"
},
{
"cve": "CVE-2021-47609",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "RHBZ#2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver"
},
{
"cve": "CVE-2022-48619",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258012"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in drivers/input/input.c in the Linux Kernel, where the input_set_capability() function mishandles scenarios where an event code is outside the bitmap. This issue can lead to a kernel panic when the event code exceeds the bitmap for the specified event type, which could allow an attacker to cause a kernel crash and potential disruption of services.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48619"
},
{
"category": "external",
"summary": "RHBZ#2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619"
},
{
"category": "external",
"summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
"url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic"
},
{
"cve": "CVE-2022-48754",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293304"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: phylib: fix potential use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "RHBZ#2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: phylib: fix potential use-after-free"
},
{
"cve": "CVE-2022-48760",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293377"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "RHBZ#2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers"
},
{
"cve": "CVE-2022-48804",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298140"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48804"
},
{
"category": "external",
"summary": "RHBZ#2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate"
},
{
"cve": "CVE-2022-48836",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298177"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: aiptek - properly check endpoint type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48836"
},
{
"category": "external",
"summary": "RHBZ#2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: aiptek - properly check endpoint type"
},
{
"cve": "CVE-2022-48866",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298640"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts\n\nSyzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.\nThe root case is in missing validation check of actual number of endpoints.\n\nCode should not blindly access usb_host_interface::endpoint array, since\nit may contain less endpoints than code expects.\n\nFix it by adding missing validaion check and print an error if\nnumber of endpoints do not match expected number",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48866"
},
{
"category": "external",
"summary": "RHBZ#2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258013"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability was found in the Linux Kernel. This issue occurs during the creation of a new netfilter table. The absence of safeguards in the nf_tables_newtable function against invalid nf_tables family (pf) values allows attackers to achieve unauthorized access. Exploitation occurs in two locations: the xt_find_target function in x_tables.c permits faking xt_af data, and the nf_logger_find_get function in nf_log.c can enable an attacker to use an invalid pf to dereference adjacent global data. By manipulating these values, an attacker could achieve unauthorized access beyond the intended boundaries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability can only be triggered locally and the attacker needs to be logged into the system. For these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6040"
},
{
"category": "external",
"summary": "RHBZ#2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/01/12/1",
"url": "https://www.openwall.com/lists/oss-security/2024/01/12/1"
}
],
"release_date": "2024-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()"
},
{
"cve": "CVE-2023-52470",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266358"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in alloc_workqueue in the Linux Kernel. Check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null-ptr-deref in alloc_workqueue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52470"
},
{
"category": "external",
"summary": "RHBZ#2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
"url": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1",
"url": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41",
"url": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb",
"url": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
"url": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310",
"url": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85",
"url": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
"url": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: null-ptr-deref in alloc_workqueue"
},
{
"cve": "CVE-2023-52476",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267041"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n __insn_get_emulate_prefix()\n insn_get_emulate_prefix()\n insn_get_prefixes()\n insn_get_opcode()\n decode_branch_type()\n get_branch_type()\n intel_pmu_lbr_filter()\n intel_pmu_handle_irq()\n perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n (insn)-\u003enext_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/x86/lbr: Filter vsyscall addresses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52476"
},
{
"category": "external",
"summary": "RHBZ#2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/x86/lbr: Filter vsyscall addresses"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267036"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue can cause a potential crash on the receiver USB disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "RHBZ#2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect"
},
{
"cve": "CVE-2023-52522",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel that allows for potential store tearing within the neigh_periodic_work() function, meaning a write operation on a value is not protected properly and could result in inconsistencies if another process or thread reads from that value before the operation is complete.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix possible store tearing in neigh_periodic_work()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"category": "external",
"summary": "RHBZ#2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix possible store tearing in neigh_periodic_work()"
},
{
"cve": "CVE-2023-52605",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268295"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A NULL pointer dereference issue was identified in the Linux kernel within the ACPI subsystem\u0027s extlog module. In the extlog_exit() function, the extlog_l1_addr pointer was dereferenced before verifying if it was NULL, potentially causing system instability or crashes during the cleanup process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: extlog: fix NULL pointer dereference check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected upstream:- https://lore.kernel.org/linux-cve-announce/20240318151025.2952751-2-lee@kernel.org/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52605"
},
{
"category": "external",
"summary": "RHBZ#2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T"
}
],
"release_date": "2024-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: extlog: fix NULL pointer dereference check"
},
{
"cve": "CVE-2023-52683",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281317"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (\u003e UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52683"
},
{
"category": "external",
"summary": "RHBZ#2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282676"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] \u003cTASK\u003e\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] \u003c/TASK\u003e\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52817"
},
{
"category": "external",
"summary": "RHBZ#2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282757"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()\n\nThe put_device() calls rmi_release_function() which frees \"fn\" so the\ndereference on the next line \"fn-\u003enum_of_irqs\" is a use after free.\nMove the put_device() to the end to fix this.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52840"
},
{
"category": "external",
"summary": "RHBZ#2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()"
},
{
"cve": "CVE-2024-23848",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2260038"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. A use-after-free exists in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cec_queue_msg_fh",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23848"
},
{
"category": "external",
"summary": "RHBZ#2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/",
"url": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cec_queue_msg_fh"
},
{
"cve": "CVE-2024-26595",
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265799"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where a faulty error handler in the driver for certain Mellanox hardware could lead to a null pointer reference. This issue affects system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "RHBZ#2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271648"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Ensure visibility when inserting an element into tracing_map\n\nRunning the following two commands in parallel on a multi-processor\nAArch64 machine can sporadically produce an unexpected warning about\nduplicate histogram entries:\n\n $ while true; do\n echo hist:key=id.syscall:val=hitcount \u003e \\\n /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger\n cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist\n sleep 0.001\n done\n $ stress-ng --sysbadaddr $(nproc)\n\nThe warning looks as follows:\n\n[ 2911.172474] ------------[ cut here ]------------\n[ 2911.173111] Duplicates detected: 1\n[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408\n[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)\n[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1\n[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G E 6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01\n[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018\n[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.185310] sp : ffff8000a1513900\n[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001\n[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008\n[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180\n[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff\n[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8\n[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731\n[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c\n[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8\n[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000\n[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480\n[ 2911.194259] Call trace:\n[ 2911.194626] tracing_map_sort_entries+0x3e0/0x408\n[ 2911.195220] hist_show+0x124/0x800\n[ 2911.195692] seq_read_iter+0x1d4/0x4e8\n[ 2911.196193] seq_read+0xe8/0x138\n[ 2911.196638] vfs_read+0xc8/0x300\n[ 2911.197078] ksys_read+0x70/0x108\n[ 2911.197534] __arm64_sys_read+0x24/0x38\n[ 2911.198046] invoke_syscall+0x78/0x108\n[ 2911.198553] el0_svc_common.constprop.0+0xd0/0xf8\n[ 2911.199157] do_el0_svc+0x28/0x40\n[ 2911.199613] el0_svc+0x40/0x178\n[ 2911.200048] el0t_64_sync_handler+0x13c/0x158\n[ 2911.200621] el0t_64_sync+0x1a8/0x1b0\n[ 2911.201115] ---[ end trace 0000000000000000 ]---\n\nThe problem appears to be caused by CPU reordering of writes issued from\n__tracing_map_insert().\n\nThe check for the presence of an element with a given key in this\nfunction is:\n\n val = READ_ONCE(entry-\u003eval);\n if (val \u0026\u0026 keys_match(key, val-\u003ekey, map-\u003ekey_size)) ...\n\nThe write of a new entry is:\n\n elt = get_free_elt(map);\n memcpy(elt-\u003ekey, key, map-\u003ekey_size);\n entry-\u003eval = elt;\n\nThe \"memcpy(elt-\u003ekey, key, map-\u003ekey_size);\" and \"entry-\u003eval = elt;\"\nstores may become visible in the reversed order on another CPU. This\nsecond CPU might then incorrectly determine that a new key doesn\u0027t match\nan already present val-\u003ekey and subse\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tracing: Ensure visibility when inserting an element into tracing_map",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26645"
},
{
"category": "external",
"summary": "RHBZ#2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tracing: Ensure visibility when inserting an element into tracing_map"
},
{
"cve": "CVE-2024-26649",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271796"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the drm/amdgpu driver of Linux Kernel, causing null pointer dereference when attempting to load RLC (Run-Length Coding) firmware. This issue arises if the firmware has an incorrect header size, causing premature release of the firmware pointer in amdgpu_ucode_request(), subsequently attempts to use the nullified pointer result in errors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null pointer when load rlc firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26649"
},
{
"category": "external",
"summary": "RHBZ#2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: null pointer when load rlc firmware"
},
{
"cve": "CVE-2024-26665",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue occurs due to the improper handling of non-linear skbs (socket buffers) when calculating checksums for ICMPv6 PMTU error messages. This vulnerability can lead to out-of-bounds access, potentially causing memory corruption or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability, as it was already patched in the 9.4.0 release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"category": "external",
"summary": "RHBZ#2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error"
},
{
"cve": "CVE-2024-26717",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273148"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid-of: fix NULL-deref on failed power up\n\nA while back the I2C HID implementation was split in an ACPI and OF\npart, but the new OF driver never initialises the client pointer which\nis dereferenced on power-up failures.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26717"
},
{
"category": "external",
"summary": "RHBZ#2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the wb_dirty_limits() function in the Linux kernel memory management (mm) subsystem which can lead to a divide-by-zero error. This issue could lead to a potential kernel crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because the conditions necessary to exploit it and cause a potential denial of service (DoS) would require specific conditions to manipulate the wb_dirty_limits() function in the context of global writeback operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26720"
},
{
"category": "external",
"summary": "RHBZ#2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
},
{
"cve": "CVE-2024-26769",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273180"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-fc: avoid deadlock on delete association path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26769"
},
{
"category": "external",
"summary": "RHBZ#2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26769"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmet-fc: avoid deadlock on delete association path"
},
{
"cve": "CVE-2024-26855",
"cwe": {
"id": "CWE-690",
"name": "Unchecked Return Value to NULL Pointer Dereference"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275742"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ice_bridge_setlink() function in the Linux kernel. A missing check to verify whether the nlmsg_find_attr() function returns NULL or not could lead to a NULL pointer dereference, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26855"
},
{
"category": "external",
"summary": "RHBZ#2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()"
},
{
"cve": "CVE-2024-26880",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s device-mapper (dm) component. The issue arises during internal suspend operations where the resume method is not correctly called. This issue leads to problems such as list corruption, specifically observed when running the lvm2 test suite. The problem occurs because of two consecutive calls to the origin_postsuspend function, which results in attempts to remove an entry from a list that has already been removed, triggering a crash.\nThe kernel patch resolves this issue by ensuring that the preresume and resume methods are paired correctly during internal suspend and resume cycles. This prevents the list corruption and avoids the crash. The patch has been integrated into the kernel, and users are encouraged to update their systems to the latest version to ensure this vulnerability is mitigated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: call the resume method on internal suspend",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26880"
},
{
"category": "external",
"summary": "RHBZ#2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: call the resume method on internal suspend"
},
{
"cve": "CVE-2024-26894",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275661"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26894"
},
{
"category": "external",
"summary": "RHBZ#2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2277171"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the management of inter-process communication uses AF_UNIX sockets. The issue arises from a race condition where a partially initialized socket with specific permissions carrying SCM_RIGHTS is improperly handled during garbage collection. This situation leads to an incorrect count of active sockets, potentially causing resources to remain unaccounted for and never released.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: af_unix: Fix garbage collector racing against connect()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Moderate due to the worst-case scenario resulting in a resource consumption attack. Considering this is a timing attack and is hard to replicate outside of very controlled environments, the vulnerability is not rated higher.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "RHBZ#2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"
}
],
"release_date": "2024-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "There are no known mitigations to this issue and updating to the latest Linux kernel version is recommended to address this vulnerability\u200b.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: af_unix: Fix garbage collector racing against connect()"
},
{
"cve": "CVE-2024-26939",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278220"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in drivers/gpu/drm/i915/i915_vma.c in the Linux kernel that may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915/vma: Fix UAF on destroy against retire race",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26939"
},
{
"category": "external",
"summary": "RHBZ#2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/i915/vma: Fix UAF on destroy against retire race"
},
{
"cve": "CVE-2024-27013",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036 TASK: ffff949da6f20000 CPU: 23 COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n [exception RIP: io_serial_in+20]\n RIP: ffffffff89792594 RSP: ffffa655314979e8 RFLAGS: 00000002\n RAX: ffffffff89792500 RBX: ffffffff8af428a0 RCX: 0000000000000000\n RDX: 00000000000003fd RSI: 0000000000000005 RDI: ffffffff8af428a0\n RBP: 0000000000002710 R8: 0000000000000004 R9: 000000000000000f\n R10: 0000000000000000 R11: ffffffff8acbf64f R12: 0000000000000020\n R13: ffffffff8acbf698 R14: 0000000000000058 R15: 0000000000000000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tun: limit printing rate when illegal packet received by tun dev",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27013"
},
{
"category": "external",
"summary": "RHBZ#2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tun: limit printing rate when illegal packet received by tun dev"
},
{
"cve": "CVE-2024-27042",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278447"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c in the Linux kernel. This issue may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has protection mechanisms in place against buffer overflows such as FORTIFY_SOURCE, Position Independent Executables, or Stack Smashing Protection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27042"
},
{
"category": "external",
"summary": "RHBZ#2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;"
},
{
"cve": "CVE-2024-35809",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281217"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the PCI subsystem in the Linux kernel, where runtime-idle callbacks are not always drained before a PCI driver is removed. If these callbacks are still active when the driver is removed, it could result in system instability or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "RHBZ#2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal"
},
{
"cve": "CVE-2024-35877",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281720"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "RHBZ#2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings"
},
{
"cve": "CVE-2024-35884",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281704"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35884 highlights a flaw in the Linux kernel\u0027s handling of UDP packets when Generic Receive Offload (GRO) forwarding is enabled. The issue occurs because non-tunnel UDP packets are sometimes mistakenly processed as if they belong to a tunnel. This can lead to data corruption or kernel crashes, particularly in environments with complex network configurations or when certain tunneling protocols like Geneve are used.\n\nThe kernel\u0027s processing logic for GRO and UDP packets fails to properly differentiate between tunneled and non-tunneled packets. As a result, improperly handled packets may lead to segmentation errors or system instability.\n\nThis vulnerability affects system availability and could result in crashes or data integrity issues during packet forwarding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"category": "external",
"summary": "RHBZ#2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel"
},
{
"cve": "CVE-2024-35944",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281807"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "RHBZ#2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()"
},
{
"cve": "CVE-2024-35989",
"discovery_date": "2024-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281847"
}
],
"notes": [
{
"category": "description",
"text": "This is a vulnerability in the Linux kernel\u0027s Data Movement Accelerator (DMA) engine, specifically affecting the Intel Data Streaming Accelerator (IDXD) driver. The issue arises during the removal (rmmod) of the idxd driver on systems with only one active CPU. In such scenarios, the driver\u0027s cleanup process attempts to migrate performance monitoring unit (PMU) contexts to another CPU. However, with no other CPUs available, this leads to a kernel oops\u2014a serious error causing the system to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35989"
},
{
"category": "external",
"summary": "RHBZ#2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms"
},
{
"cve": "CVE-2024-36883",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284271"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s networking subsystem in how a local user triggers a complex race condition. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix out-of-bounds access in ops_init",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36883"
},
{
"category": "external",
"summary": "RHBZ#2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix out-of-bounds access in ops_init"
},
{
"cve": "CVE-2024-36901",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284634"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 \u003c42\u003e 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS: 00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent NULL dereference in ip6_output()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36901"
},
{
"category": "external",
"summary": "RHBZ#2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent NULL dereference in ip6_output()"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284545"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 \u003c42\u003e 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS: 00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36902"
},
{
"category": "external",
"summary": "RHBZ#2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()"
},
{
"cve": "CVE-2024-36920",
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284515"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Avoid memcpy field-spanning write WARNING\n\nWhen the \"storcli2 show\" command is executed for eHBA-9600, mpi3mr driver\nprints this WARNING message:\n\n memcpy: detected field-spanning write (size 128) of single field \"bsg_reply_buf-\u003ereply_buf\" at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size 1)\n WARNING: CPU: 0 PID: 12760 at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 mpi3mr_bsg_request+0x6b12/0x7f10 [mpi3mr]\n\nThe cause of the WARN is 128 bytes memcpy to the 1 byte size array \"__u8\nreplay_buf[1]\" in the struct mpi3mr_bsg_in_reply_buf. The array is intended\nto be a flexible length array, so the WARN is a false positive.\n\nTo suppress the WARN, remove the constant number \u00271\u0027 from the array\ndeclaration and clarify that it has flexible length. Also, adjust the\nmemory allocation size to match the change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36920"
},
{
"category": "external",
"summary": "RHBZ#2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING"
},
{
"cve": "CVE-2024-36939",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284628"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet\u0027s handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname \u0027nfs\u0027\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36939"
},
{
"category": "external",
"summary": "RHBZ#2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init()."
},
{
"cve": "CVE-2024-36953",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284596"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()\n\nvgic_v2_parse_attr() is responsible for finding the vCPU that matches\nthe user-provided CPUID, which (of course) may not be valid. If the ID\nis invalid, kvm_get_vcpu_by_id() returns NULL, which isn\u0027t handled\ngracefully.\n\nSimilar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()\nactually returns something and fail the ioctl if not.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36953"
},
{
"category": "external",
"summary": "RHBZ#2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293658"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n alpha -= min_not_zero(alpha, alpha \u003e\u003e dctcp_shift_g);\n ...\n delivered_ce \u003c\u003c= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n memcpy((void*)0x20000080,\n \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n /*flags=*/2ul, /*mode=*/0ul);\n memcpy((void*)0x20000000, \"100\\000\", 4);\n syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet\u0027s limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n # echo 10 \u003e /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n 10\n # echo 11 \u003e /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type \u0027u32\u0027 (aka \u0027unsigned int\u0027)\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37356"
},
{
"category": "external",
"summary": "RHBZ#2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T"
}
],
"release_date": "2024-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha()."
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293441"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc. Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an \u0027ipv6.nd\u0027 field. However, the \u0027ipv6\u0027 is a union that shares\nthe space between \u0027nd\u0027 and \u0027ct_orig\u0027 that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it\u0027s fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine. Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn\u0027t\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38558"
},
{
"category": "external",
"summary": "RHBZ#2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6"
},
{
"cve": "CVE-2024-38559",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293440"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "RHBZ#2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated"
},
{
"cve": "CVE-2024-38570",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293423"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix potential glock use-after-free on unmount\n\nWhen a DLM lockspace is released and there ares still locks in that\nlockspace, DLM will unlock those locks automatically. Commit\nfb6791d100d1b started exploiting this behavior to speed up filesystem\nunmount: gfs2 would simply free glocks it didn\u0027t want to unlock and then\nrelease the lockspace. This didn\u0027t take the bast callbacks for\nasynchronous lock contention notifications into account, which remain\nactive until until a lock is unlocked or its lockspace is released.\n\nTo prevent those callbacks from accessing deallocated objects, put the\nglocks that should not be unlocked on the sd_dead_glocks list, release\nthe lockspace, and only then free those glocks.\n\nAs an additional measure, ignore unexpected ast and bast callbacks if\nthe receiving glock is dead.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gfs2: Fix potential glock use-after-free on unmount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity due to its localized impact. Exploitation requires specific conditions during unmount, affecting stability without extensive security risks, as it impacts only the file system\u2019s lock management on unmount.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38570"
},
{
"category": "external",
"summary": "RHBZ#2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gfs2: Fix potential glock use-after-free on unmount"
},
{
"cve": "CVE-2024-38581",
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue is due to a possible use-after-free in drivers/gpu/drm/amd/amdgpu/amdgpu_mes.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu/mes: fix use-after-free issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38581"
},
{
"category": "external",
"summary": "RHBZ#2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu/mes: fix use-after-free issue"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293273"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n first initialization.\n- Add an error check for the return value of alauda_init_media().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb-storage: alauda: Check whether the media is initialized",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38619"
},
{
"category": "external",
"summary": "RHBZ#2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: usb-storage: alauda: Check whether the media is initialized"
},
{
"cve": "CVE-2024-39471",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294313"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39471"
},
{
"category": "external",
"summary": "RHBZ#2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T"
}
],
"release_date": "2024-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds"
},
{
"cve": "CVE-2024-39499",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297471"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the event_deliver() function in the Linux kernel\u0027s VMCI component, where the issue involves a lack of sanitization for the event_data.event index controlled by user-space, which could lead to speculative information leaks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39499"
},
{
"category": "external",
"summary": "RHBZ#2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()"
},
{
"cve": "CVE-2024-39501",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297473"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: core: synchronize really_probe() and dev_uevent()\n\nSynchronize the dev-\u003edriver usage in really_probe() and dev_uevent().\nThese can run in different threads, what can result in the following\nrace condition for dev-\u003edriver uninitialization:\n\nThread #1:\n==========\n\nreally_probe() {\n...\nprobe_failed:\n...\ndevice_unbind_cleanup(dev) {\n ...\n dev-\u003edriver = NULL; // \u003c= Failed probe sets dev-\u003edriver to NULL\n ...\n }\n...\n}\n\nThread #2:\n==========\n\ndev_uevent() {\n...\nif (dev-\u003edriver)\n // If dev-\u003edriver is NULLed from really_probe() from here on,\n // after above check, the system crashes\n add_uevent_var(env, \"DRIVER=%s\", dev-\u003edriver-\u003ename);\n...\n}\n\nreally_probe() holds the lock, already. So nothing needs to be done\nthere. dev_uevent() is called with lock held, often, too. But not\nalways. What implies that we can\u0027t add any locking in dev_uevent()\nitself. So fix this race by adding the lock to the non-protected\npath. This is the path where above race is observed:\n\n dev_uevent+0x235/0x380\n uevent_show+0x10c/0x1f0 \u003c= Add lock here\n dev_attr_show+0x3a/0xa0\n sysfs_kf_seq_show+0x17c/0x250\n kernfs_seq_show+0x7c/0x90\n seq_read_iter+0x2d7/0x940\n kernfs_fop_read_iter+0xc6/0x310\n vfs_read+0x5bc/0x6b0\n ksys_read+0xeb/0x1b0\n __x64_sys_read+0x42/0x50\n x64_sys_call+0x27ad/0x2d30\n do_syscall_64+0xcd/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSimilar cases are reported by syzkaller in\n\nhttps://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a\n\nBut these are regarding the *initialization* of dev-\u003edriver\n\ndev-\u003edriver = drv;\n\nAs this switches dev-\u003edriver to non-NULL these reports can be considered\nto be false-positives (which should be \"fixed\" by this commit, as well,\nthough).\n\nThe same issue was reported and tried to be fixed back in 2015 in\n\nhttps://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/\n\nalready.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers: core: synchronize really_probe() and dev_uevent()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39501"
},
{
"category": "external",
"summary": "RHBZ#2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drivers: core: synchronize really_probe() and dev_uevent()"
},
{
"cve": "CVE-2024-39506",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297478"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t octeon_droq_dispatch_pkt\n\t octeon_create_recv_info\n\t ...search in the dispatch_list...\n\t -\u003edisp_fn(rdisp-\u003erinfo, ...)\n\t lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info-\u003epage to NULL.\nSo this check looks unneeded and doesn\u0027t solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can\u0027t do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39506"
},
{
"category": "external",
"summary": "RHBZ#2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet"
},
{
"cve": "CVE-2024-40901",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297706"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40901"
},
{
"category": "external",
"summary": "RHBZ#2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory"
},
{
"cve": "CVE-2024-40904",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver\u0027s immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#2: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#3: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#4: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#5: 98% system,\t 1% softirq,\t 3% hardirq,\t 0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [\u003cffff800080020de8\u003e] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls. Therefore we replace them with\ndev_err_ratelimited().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40904"
},
{
"category": "external",
"summary": "RHBZ#2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages"
},
{
"cve": "CVE-2024-40911",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297495"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Lock wiphy in cfg80211_get_station\n\nWiphy should be locked before calling rdev_get_station() (see lockdep\nassert in ieee80211_get_station()).\n\nThis fixes the following kernel NULL dereference:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n ESR = 0x0000000096000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000\n [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000\n Internal error: Oops: 0000000096000006 [#1] SMP\n Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath\n CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705\n Hardware name: RPT (r1) (DT)\n Workqueue: bat_events batadv_v_elp_throughput_metric_update\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n lr : sta_set_sinfo+0xcc/0xbd4\n sp : ffff000007b43ad0\n x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98\n x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000\n x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc\n x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000\n x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d\n x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e\n x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000\n x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000\n x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90\n x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000\n Call trace:\n ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n sta_set_sinfo+0xcc/0xbd4\n ieee80211_get_station+0x2c/0x44\n cfg80211_get_station+0x80/0x154\n batadv_v_elp_get_throughput+0x138/0x1fc\n batadv_v_elp_throughput_metric_update+0x1c/0xa4\n process_one_work+0x1ec/0x414\n worker_thread+0x70/0x46c\n kthread+0xdc/0xe0\n ret_from_fork+0x10/0x20\n Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)\n\nThis happens because STA has time to disconnect and reconnect before\nbatadv_v_elp_throughput_metric_update() delayed work gets scheduled. In\nthis situation, ath10k_sta_state() can be in the middle of resetting\narsta data when the work queue get chance to be scheduled and ends up\naccessing it. Locking wiphy prevents that.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40911"
},
{
"category": "external",
"summary": "RHBZ#2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station"
},
{
"cve": "CVE-2024-40912",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297496"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta-\u003eps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta-\u003eps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu: (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G W 6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n queued_spin_lock_slowpath+0x58/0x2d0\n ieee80211_tx+0x80/0x12c\n ieee80211_tx_pending+0x110/0x278\n tasklet_action_common.constprop.0+0x10c/0x144\n tasklet_action+0x20/0x28\n _stext+0x11c/0x284\n ____do_softirq+0xc/0x14\n call_on_irq_stack+0x24/0x34\n do_softirq_own_stack+0x18/0x20\n do_softirq+0x74/0x7c\n __local_bh_enable_ip+0xa0/0xa4\n _ieee80211_wake_txqs+0x3b0/0x4b8\n __ieee80211_wake_queue+0x12c/0x168\n ieee80211_add_pending_skbs+0xec/0x138\n ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n ieee80211_mps_sta_status_update+0x18/0x24\n sta_apply_parameters+0x3bc/0x4c0\n ieee80211_change_station+0x1b8/0x2dc\n nl80211_set_station+0x444/0x49c\n genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n genl_rcv_msg+0x1b0/0x244\n netlink_rcv_skb+0x38/0x10c\n genl_rcv+0x34/0x48\n netlink_unicast+0x254/0x2bc\n netlink_sendmsg+0x190/0x3b4\n ____sys_sendmsg+0x1e8/0x218\n ___sys_sendmsg+0x68/0x8c\n __sys_sendmsg+0x44/0x84\n __arm64_sys_sendmsg+0x20/0x28\n do_el0_svc+0x6c/0xe8\n el0_svc+0x14/0x48\n el0t_64_sync_handler+0xb0/0xb4\n el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40912"
},
{
"category": "external",
"summary": "RHBZ#2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()"
},
{
"cve": "CVE-2024-40929",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297513"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40929"
},
{
"category": "external",
"summary": "RHBZ#2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids"
},
{
"cve": "CVE-2024-40931",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297515"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_una is properly initialized on connect\n\nThis is strictly related to commit fb7a0d334894 (\"mptcp: ensure snd_nxt\nis properly initialized on connect\"). It turns out that syzkaller can\ntrigger the retransmit after fallback and before processing any other\nincoming packet - so that snd_una is still left uninitialized.\n\nAddress the issue explicitly initializing snd_una together with snd_nxt\nand write_seq.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: ensure snd_una is properly initialized on connect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40931"
},
{
"category": "external",
"summary": "RHBZ#2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: ensure snd_una is properly initialized on connect"
},
{
"cve": "CVE-2024-40941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40941"
},
{
"category": "external",
"summary": "RHBZ#2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation"
},
{
"cve": "CVE-2024-40954",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297538"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n * attaching an fentry probe to __sock_release() and the probe calling the\n bpf_get_socket_cookie() helper\n * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: do not leave a dangling sk pointer, when socket creation fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40954"
},
{
"category": "external",
"summary": "RHBZ#2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: do not leave a dangling sk pointer, when socket creation fails"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297542"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetns: Make get_net_ns() handle zero refcount net\n\nSyzkaller hit a warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0\nModules linked in:\nCPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xdf/0x1d0\nCode: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 \u003c0f\u003e 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1\nRSP: 0018:ffff8881067b7da0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac\nRDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001\nRBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139\nR10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4\nR13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040\nFS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0xa3/0xc0\n ? __warn+0xa5/0x1c0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? report_bug+0x1fc/0x2d0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? handle_bug+0xa1/0x110\n ? exc_invalid_op+0x3c/0xb0\n ? asm_exc_invalid_op+0x1f/0x30\n ? __warn_printk+0xcc/0x140\n ? __warn_printk+0xd5/0x140\n ? refcount_warn_saturate+0xdf/0x1d0\n get_net_ns+0xa4/0xc0\n ? __pfx_get_net_ns+0x10/0x10\n open_related_ns+0x5a/0x130\n __tun_chr_ioctl+0x1616/0x2370\n ? __sanitizer_cov_trace_switch+0x58/0xa0\n ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30\n ? __pfx_tun_chr_ioctl+0x10/0x10\n tun_chr_ioctl+0x2f/0x40\n __x64_sys_ioctl+0x11b/0x160\n x64_sys_call+0x1211/0x20d0\n do_syscall_64+0x9e/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5b28f165d7\nCode: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8\nRSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7\nRDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003\nRBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0\nR10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730\nR13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nThis is trigger as below:\n ns0 ns1\ntun_set_iff() //dev is tun0\n tun-\u003edev = dev\n//ip link set tun0 netns ns1\n put_net() //ref is 0\n__tun_chr_ioctl() //TUNGETDEVNETNS\n net = dev_net(tun-\u003edev);\n open_related_ns(\u0026net-\u003ens, get_net_ns); //ns1\n get_net_ns()\n get_net() //addition on 0\n\nUse maybe_get_net() in get_net_ns in case net\u0027s ref is zero to fix this",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netns: Make get_net_ns() handle zero refcount net",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40958"
},
{
"category": "external",
"summary": "RHBZ#2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netns: Make get_net_ns() handle zero refcount net"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297543"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40959"
},
{
"category": "external",
"summary": "RHBZ#2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297544"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL dereference in rt6_probe()\n\nsyzbot caught a NULL dereference in rt6_probe() [1]\n\nBail out if __in6_dev_get() returns NULL.\n\n[1]\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]\nCPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]\n RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758\nCode: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19\nRSP: 0018:ffffc900034af070 EFLAGS: 00010203\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000\nRDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c\nRBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a\nR13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000\nFS: 00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784\n nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496\n __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825\n find_rr_leaf net/ipv6/route.c:853 [inline]\n rt6_select net/ipv6/route.c:897 [inline]\n fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195\n ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231\n pol_lookup_func include/net/ip6_fib.h:616 [inline]\n fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121\n ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]\n ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651\n ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147\n ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250\n rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898\n inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_write_iter+0x4b8/0x5c0 net/socket.c:1160\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x6b6/0x1140 fs/read_write.c:590\n ksys_write+0x1f8/0x260 fs/read_write.c:643\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40960"
},
{
"category": "external",
"summary": "RHBZ#2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()"
},
{
"cve": "CVE-2024-40972",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297556"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: do not create EA inode under buffer lock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40972"
},
{
"category": "external",
"summary": "RHBZ#2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: do not create EA inode under buffer lock"
},
{
"cve": "CVE-2024-40977",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297561"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mt76 driver for the mt7921s chip, where a potential deadlock could occur during chip recovery. This situation arises when the kernel worker reset_work holds a lock while waiting for the stat_worker thread, which is simultaneously waiting for the same lock to be released, which leads to hung tasks and may even result in device reboots.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40977"
},
{
"category": "external",
"summary": "RHBZ#2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery"
},
{
"cve": "CVE-2024-40978",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297562"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedi: Fix crash while reading debugfs attribute",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40978"
},
{
"category": "external",
"summary": "RHBZ#2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedi: Fix crash while reading debugfs attribute"
},
{
"cve": "CVE-2024-40988",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297572"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40988"
},
{
"category": "external",
"summary": "RHBZ#2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c"
},
{
"cve": "CVE-2024-40989",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297573"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s KVM for ARM64 within the vgic-init.c, vgic-mmio-v3.c, and vgic.h files. The virtual vCPUs may retain dangling pointers in a redistributor region after they have been torn down, leading to potential memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40989"
},
{
"category": "external",
"summary": "RHBZ#2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297579"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "RHBZ#2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()"
},
{
"cve": "CVE-2024-40997",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297581"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: fix memory leak on CPU EPP exit\n\nThe cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is\nnot freed in the analogous exit function, so fix that.\n\n[ rjw: Subject and changelog edits ]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40997"
},
{
"category": "external",
"summary": "RHBZ#2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40997"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit"
},
{
"cve": "CVE-2024-40998",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297582"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs-\u003elock:\n\next4_fill_super\n ext4_register_sysfs\n // sysfs registered msg_ratelimit_interval_ms\n // Other processes modify rs-\u003einterval to\n // non-zero via msg_ratelimit_interval_ms\n ext4_orphan_cleanup\n ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n __ext4_msg\n ___ratelimit(\u0026(EXT4_SB(sb)-\u003es_msg_ratelimit_state)\n if (!rs-\u003einterval) // do nothing if interval is 0\n return 1;\n raw_spin_trylock_irqsave(\u0026rs-\u003elock, flags)\n raw_spin_trylock(lock)\n _raw_spin_trylock\n __raw_spin_trylock\n spin_acquire(\u0026lock-\u003edep_map, 0, 1, _RET_IP_)\n lock_acquire\n __lock_acquire\n register_lock_class\n assign_lock_key\n dump_stack();\n ratelimit_state_init(\u0026sbi-\u003es_msg_ratelimit_state, 5 * HZ, 10);\n raw_spin_lock_init(\u0026rs-\u003elock);\n // init rs-\u003elock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs-\u003elock, so it is possible to change rs-\u003einterval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs-\u003elock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs-\u003elock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40998"
},
{
"category": "external",
"summary": "RHBZ#2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297589"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n\u003csnip\u003e\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n\u003csnip\u003e\n\tvalue changed: 0x0000000a -\u003e 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi-\u003epoll_owner\nnon atomically. The -\u003epoll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netpoll: Fix race condition in netpoll_owner_active",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41005"
},
{
"category": "external",
"summary": "RHBZ#2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netpoll: Fix race condition in netpoll_owner_active"
},
{
"cve": "CVE-2024-41007",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297909"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the tcp_retransmit_timer function in the Linux kernel\u0027s TCP implementation. This issue occurs when a TCP socket uses TCP_USER_TIMEOUT and the peer\u0027s window retracts to zero, leading to excessive retransmission of packets every two milliseconds for up to four minutes after the timeout, which can result in network congestion and performance degradation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: avoid too many retransmit packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41007"
},
{
"category": "external",
"summary": "RHBZ#2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: avoid too many retransmit packets"
},
{
"cve": "CVE-2024-41008",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298079"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm-\u003etask_info handling\n\nThis patch changes the handling and lifecycle of vm-\u003etask_info object.\nThe major changes are:\n- vm-\u003etask_info is a dynamically allocated ptr now, and its uasge is\n reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n - amdgpu_vm_get_task_info: reference counts up task_info before\n returning this info\n - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm-\u003etask_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n - Fix wrong indentation\n - No debug message for -ENOMEM\n - Add NULL check for task_info\n - Do not duplicate the debug messages (ti vs no ti)\n - Get first reference of task_info in vm_init(), put last\n in vm_fini()\n\nV4: Fixed review comments from Felix\n - fix double reference increment in create_task_info\n - change amdgpu_vm_get_task_info_pasid\n - additional changes in amdgpu_gem.c while porting",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41008"
},
{
"category": "external",
"summary": "RHBZ#2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling"
},
{
"cve": "CVE-2024-41012",
"discovery_date": "2024-07-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299452"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Remove locks reliably when fcntl/close race is detected\n\nWhen fcntl_setlk() races with close(), it removes the created lock with\ndo_lock_file_wait().\nHowever, LSMs can allow the first do_lock_file_wait() that created the lock\nwhile denying the second do_lock_file_wait() that tries to remove the lock.\nSeparately, posix_lock_file() could also fail to\nremove a lock due to GFP_KERNEL allocation failure (when splitting a range\nin the middle).\n\nAfter the bug has been triggered, use-after-free reads will occur in\nlock_get_status() when userspace reads /proc/locks. This can likely be used\nto read arbitrary kernel memory, but can\u0027t corrupt kernel memory.\n\nFix it by calling locks_remove_posix() instead, which is designed to\nreliably get rid of POSIX locks associated with the given file and\nfiles_struct and is also used by filp_flush().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filelock: Remove locks reliably when fcntl/close race is detected",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41012"
},
{
"category": "external",
"summary": "RHBZ#2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T"
}
],
"release_date": "2024-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: filelock: Remove locks reliably when fcntl/close race is detected"
},
{
"cve": "CVE-2024-41013",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300296"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don\u0027t walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don\u0027t stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup-\u003elength to dup-\u003elength-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41013"
},
{
"category": "external",
"summary": "RHBZ#2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block"
},
{
"cve": "CVE-2024-41014",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300297"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n 1) Mount an image of xfs, and do some file operations to leave records\n 2) Before umounting, copy the image for subsequent steps to simulate\n abnormal exit. Because umount will ensure that tail_blk and\n head_blk are the same, which will result in the inability to enter\n xlog_recover_process_data\n 3) Write a tool to parse and modify the copied image in step 2\n 4) Make the end of the xlog_op_header entries only 1 byte away from\n xlog_rec_header-\u003eh_size\n 5) xlog_rec_header-\u003eh_num_logops++\n 6) Modify xlog_rec_header-\u003eh_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: add bounds checking to xlog_recover_process_data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41014"
},
{
"category": "external",
"summary": "RHBZ#2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: add bounds checking to xlog_recover_process_data"
},
{
"cve": "CVE-2024-41035",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300402"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the usb_parse_endpoint() function in the Linux kernel\u0027s usb drivers, where improper handling of the reserved bits in an endpoint descriptor\u0027s bEndpointAddress field can lead to confusion in the endpoint_is_duplicate() routine in config.c. This will erroneously treat the same endpoint descriptors as distinct, given that the reserved bits are not properly cleared. This can potentially lead to unexpected behavior from connected USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41035"
},
{
"category": "external",
"summary": "RHBZ#2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor"
},
{
"cve": "CVE-2024-41038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300407"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41038"
},
{
"category": "external",
"summary": "RHBZ#2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers"
},
{
"cve": "CVE-2024-41039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300408"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s firmware driver cs_dsp.c, where a buffer overflow is possible in the wmfw header due to insufficient buffer size checks. The issue stems from the size of one of the structs that the code checks, the wmfw_adsp?_sizes struct, which can vary depending on whether the firmware used is ADSP1 or ADSP2 and Halo Core. In the second case, the wmfw_adsp2_sizes struct is 4 bytes longer, which can cause a buffer overflow, potentially leading to undefined behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of moderate severity because successful exploitation of this vulnerability would require elevated privileges to be able to access/modify the firmware loading mechanism. It also presents an elevated attack complexity given that the attacker requires knowledge of the Cirrus Logic DSP firmware to be able to craft special firmware to exploit the buffer overflow. Finally, depending on when the vulnerability is executed (ex. at boot time or during runtime) the impact on the system might change drastically; in one scenario it might cause a kernel crash in another just the audio driver might stop working.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41039"
},
{
"category": "external",
"summary": "RHBZ#2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header"
},
{
"cve": "CVE-2024-41040",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300409"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the net/sshd tcf_ct_flow_table_process_conn of the Linux kernel. This flaw allows an attacker with a crafted payload to induce a system crash, resulting in a loss of system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: Fix UAF when resolving a clash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41040"
},
{
"category": "external",
"summary": "RHBZ#2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: Fix UAF when resolving a clash"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300410"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb-\u003edestructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet\u0027s apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe \u003c0f\u003e 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"category": "external",
"summary": "RHBZ#2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppp: reject claimed-as-LCP but actually malformed packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "RHBZ#2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppp: reject claimed-as-LCP but actually malformed packets"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300429"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms-\u003eusage\" to fix a race with section_deactivate() where\nms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference. We need to check its value before\ndereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41055"
},
{
"category": "external",
"summary": "RHBZ#2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()"
},
{
"cve": "CVE-2024-41056",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300430"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41056"
},
{
"category": "external",
"summary": "RHBZ#2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files"
},
{
"cve": "CVE-2024-41060",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300434"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41060"
},
{
"category": "external",
"summary": "RHBZ#2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it"
},
{
"cve": "CVE-2024-41071",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300448"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds buffer overflow has been found in the Linux kernel\u2019s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "RHBZ#2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "There are no mitigations for the flaw. Please update your system for fixes.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing"
},
{
"cve": "CVE-2024-41076",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the nfs4_set_security_label() in the Linux kernel, where the function fails to free the nfs_fattr attribute before exiting, leaving said memory allocation present. As the nfs4_set_security_label() is called repeatedly over time, this may lead to memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of low severity as the only effect of this vulnerability is to lead to memory leakage which, called repeatedly over time, may lead to memory exhaustion and impact the system\u0027s performance. Given that the max xattr size on NFSv4 systems is quite small (typically 1KB; and security xattrs tend to be significantly smaller) it is safe to assume that a system\u0027s availability being impacted solely from memory exhaustion caused by this vulnerability is unlikely and thus its impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41076"
},
{
"category": "external",
"summary": "RHBZ#2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label"
},
{
"cve": "CVE-2024-41090",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299240"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tap: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "RHBZ#2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tap: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41091",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299336"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tun: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41091"
},
{
"category": "external",
"summary": "RHBZ#2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tun: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41097",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300492"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41097"
},
{
"category": "external",
"summary": "RHBZ#2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()"
},
{
"cve": "CVE-2024-42084",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300533"
}
],
"notes": [
{
"category": "description",
"text": "An unexpected file truncate flaw was found when opening files with specific parameters in the Linux kernel\u0027s file-system. This vulnerability allows a local user to corrupt specific files when having access to these files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ftruncate: pass a signed offset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only occurs in compact mode on 64-bit architectures.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42084"
},
{
"category": "external",
"summary": "RHBZ#2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ftruncate: pass a signed offset"
},
{
"cve": "CVE-2024-42090",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300552"
}
],
"notes": [
{
"category": "description",
"text": "A deadlock flaw was found in the Linux kernel\u2019s pinctrl subsystem. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No known reproducer for this issue. It can happen due to some complex preconditions and in-error path handling.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42090"
},
{
"category": "external",
"summary": "RHBZ#2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER"
},
{
"cve": "CVE-2024-42096",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300713"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86: stop playing stack games in profile_pc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42096"
},
{
"category": "external",
"summary": "RHBZ#2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: x86: stop playing stack games in profile_pc()"
},
{
"cve": "CVE-2024-42114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301477"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the cfg80211 component in the Linux kernel, where a lack of proper range validation applied to the NL80211_ATTR_TXQ_QUANTUM can lead to a scenario where the userspace passes an extremely high value that the kernel is not designed to handle efficiently (ex. 2^31). This can cause soft lockups and system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to effectively trigger this vulnerability require the user to be able to craft and send a Netlink message with the NL80211_ATTR_TXQ_QUANTUM parameter set to an abnormally high value. The permissions necessary to set this value would require CAP_NET_ADMIN.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42114"
},
{
"category": "external",
"summary": "RHBZ#2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values"
},
{
"cve": "CVE-2024-42124",
"cwe": {
"id": "CWE-372",
"name": "Incomplete Internal State Distinction"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301489"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42124"
},
{
"category": "external",
"summary": "RHBZ#2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible"
},
{
"cve": "CVE-2024-42131",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s memory management subsystem where a lack of proper size checks on dirty limits can lead to situations where large dirty limits end up being larger than 32-bits, resulting in potential overflows and divisions by 0. This can cause memory corruption, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: avoid overflows in dirty throttling logic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to exploit this vulnerability are high, as it requires a user to have elevated permissions to set the dirty page limits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42131"
},
{
"category": "external",
"summary": "RHBZ#2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: avoid overflows in dirty throttling logic"
},
{
"cve": "CVE-2024-42152",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301519"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a possible leak when destroy a ctrl during qp establishment\n\nIn nvmet_sq_destroy we capture sq-\u003ectrl early and if it is non-NULL we\nknow that a ctrl was allocated (in the admin connect request handler)\nand we need to release pending AERs, clear ctrl-\u003esqs and sq-\u003ectrl\n(for nvme-loop primarily), and drop the final reference on the ctrl.\n\nHowever, a small window is possible where nvmet_sq_destroy starts (as\na result of the client giving up and disconnecting) concurrently with\nthe nvme admin connect cmd (which may be in an early stage). But *before*\nkill_and_confirm of sq-\u003eref (i.e. the admin connect managed to get an sq\nlive reference). In this case, sq-\u003ectrl was allocated however after it was\ncaptured in a local variable in nvmet_sq_destroy.\nThis prevented the final reference drop on the ctrl.\n\nSolve this by re-capturing the sq-\u003ectrl after all inflight request has\ncompleted, where for sure sq-\u003ectrl reference is final, and move forward\nbased on that.\n\nThis issue was observed in an environment with many hosts connecting\nmultiple ctrls simoutanuosly, creating a delay in allocating a ctrl\nleading up to this race window.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42152"
},
{
"category": "external",
"summary": "RHBZ#2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s tcp_metrics.c, where insufficient validation of the length of the source address for TCP metrics could lead to incorrect memory read (out of boundary read).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp_metrics: validate source addr length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact level is limited, because:\n1. Missed check existed before and worked correctly (because by default it worked for int32 value, even if it was not specified exactly).\n2. Even if for some specific case fail could happen, still it can lead only to incorrect memory read.\n3. Even if memory corruption happens, it should not lead to anything apart from incorrect tcp-ip statistics output to the local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"category": "external",
"summary": "RHBZ#2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp_metrics: validate source addr length"
},
{
"cve": "CVE-2024-42226",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301544"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB\n\nSome transfer events don\u0027t always point to a TRB, and consequently don\u0027t\nhave a endpoint ring. In these cases, function handle_tx_event() should\nnot proceed, because if \u0027ep-\u003eskip\u0027 is set, the pointer to the endpoint\nring is used.\n\nTo prevent a potential failure and make the code logical, return after\nchecking the completion code for a Transfer event without TRBs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42226"
},
{
"category": "external",
"summary": "RHBZ#2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB"
},
{
"cve": "CVE-2024-42228",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303077"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s amdgpu driver in the amdgpu_vce_ring_parse_cs() function where the size variable is initialized with a pointer that may not be properly set before use. This issue could lead to unpredictable behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of Moderate severity with a low impact on confidentiality given that the component primarily impacted by this vulnerability is an AMD GPU driver, which is used mainly for rendering graphics on the system. As such, a successful exploit of this vulnerability would likely not result in any sensitive information being leaked.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42228"
},
{
"category": "external",
"summary": "RHBZ#2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc"
},
{
"cve": "CVE-2024-42237",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303505"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Validate payload length before processing block\n\nMove the payload length check in cs_dsp_load() and cs_dsp_coeff_load()\nto be done before the block is processed.\n\nThe check that the length of a block payload does not exceed the number\nof remaining bytes in the firwmware file buffer was being done near the\nend of the loop iteration. However, some code before that check used the\nlength field without validating it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Validate payload length before processing block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42237"
},
{
"category": "external",
"summary": "RHBZ#2303505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: cs_dsp: Validate payload length before processing block"
},
{
"cve": "CVE-2024-42238",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303506"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. No error was returned from the cs_dsp_power_up() function if a block header is longer than the amount of data left in the file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Return error if block header overflows file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42238"
},
{
"category": "external",
"summary": "RHBZ#2303506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Return error if block header overflows file"
},
{
"cve": "CVE-2024-42240",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303508"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set, then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler (exc_debug_kernel()) to issue a warning that results in a software crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42240"
},
{
"category": "external",
"summary": "RHBZ#2303508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation"
},
{
"cve": "CVE-2024-42246",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303514"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket\n\nWhen using a BPF program on kernel_connect(), the call can return -EPERM. This\ncauses xs_tcp_setup_socket() to loop forever, filling up the syslog and causing\nthe kernel to potentially freeze up.\n\nNeil suggested:\n\n This will propagate -EPERM up into other layers which might not be ready\n to handle it. It might be safer to map EPERM to an error we would be more\n likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.\n\nECONNREFUSED as error seems reasonable. For programs setting a different error\ncan be out of reach (see handling in 4fbac77d2d09) in particular on kernels\nwhich do not have f10d05966196 (\"bpf: Make BPF_PROG_RUN_ARRAY return -err\ninstead of allow boolean\"), thus given that it is better to simply remap for\nconsistent behavior. UDP does handle EPERM in xs_udp_send_request().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42246"
},
{
"category": "external",
"summary": "RHBZ#2303514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket"
},
{
"cve": "CVE-2024-42322",
"discovery_date": "2024-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305467"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: properly dereference pe in ip_vs_add_service\n\nUse pe directly to resolve sparse warning:\n\n net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipvs: properly dereference pe in ip_vs_add_service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42322"
},
{
"category": "external",
"summary": "RHBZ#2305467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T"
}
],
"release_date": "2024-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipvs: properly dereference pe in ip_vs_add_service"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-08-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2306365"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevres: Fix memory leakage caused by driver API devm_free_percpu()\n\nIt will cause memory leakage when use driver API devm_free_percpu()\nto free memory allocated by devm_alloc_percpu(), fixed by using\ndevres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-43871"
},
{
"category": "external",
"summary": "RHBZ#2306365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2306365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-43871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-43871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43871"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T"
}
],
"release_date": "2024-08-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T00:40:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"NFV-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.src",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64",
"RT-8.10.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-553.22.1.rt7.363.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()"
}
]
}
RHSA-2024:6993
Vulnerability from csaf_redhat - Published: 2024-09-24 01:17 - Updated: 2025-12-23 21:11Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
* kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)
* kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)
* kernel: tunnels: fix out of bounds access when building IPv6 PMTU error (CVE-2024-26665)
* kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (CVE-2024-26698)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)
* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)
* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)
* kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (CVE-2022-48638)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)
* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr (CVE-2024-35969)
* kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path (CVE-2024-36005)
* kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)
* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
* kernel: virtio-net: Add validation for used length (CVE-2021-47352)
* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)
* kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)
* kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)
* kernel: isdn: mISDN: Fix sleeping function called from invalid context (CVE-2021-47468)
* kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() (CVE-2021-47566)
* kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (CVE-2024-36016)
* kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs (CVE-2024-36929)
* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)
* kernel: cpufreq: exit() callback is optional (CVE-2024-38615)
* kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)
* kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)
* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)
* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)
* kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)
* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
* kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)
* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
* kernel: tcp_metrics: validate source addr length (CVE-2024-42154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)\n\n* kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)\n\n* kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)\n\n* kernel: tunnels: fix out of bounds access when building IPv6 PMTU error (CVE-2024-26665)\n\n* kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (CVE-2024-26698)\n\n* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)\n\n* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)\n\n* kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)\n\n* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)\n\n* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)\n\n* kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (CVE-2022-48638)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)\n\n* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)\n\n* kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr (CVE-2024-35969)\n\n* kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path (CVE-2024-36005)\n\n* kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)\n\n* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)\n\n* kernel: virtio-net: Add validation for used length (CVE-2021-47352)\n\n* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)\n\n* kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)\n\n* kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)\n\n* kernel: isdn: mISDN: Fix sleeping function called from invalid context (CVE-2021-47468)\n\n* kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() (CVE-2021-47566)\n\n* kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (CVE-2024-36016)\n\n* kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs (CVE-2024-36929)\n\n* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)\n\n* kernel: cpufreq: exit() callback is optional (CVE-2024-38615)\n\n* kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)\n\n* kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)\n\n* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)\n\n* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)\n\n* kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)\n\n* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)\n\n* kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)\n\n* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)\n\n* kernel: tcp_metrics: validate source addr length (CVE-2024-42154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6993",
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2265271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265271"
},
{
"category": "external",
"summary": "2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "2273117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273117"
},
{
"category": "external",
"summary": "2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "2275604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275604"
},
{
"category": "external",
"summary": "2275744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275744"
},
{
"category": "external",
"summary": "2275750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275750"
},
{
"category": "external",
"summary": "2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "2277829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277829"
},
{
"category": "external",
"summary": "2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "2280462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280462"
},
{
"category": "external",
"summary": "2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "2281900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281900"
},
{
"category": "external",
"summary": "2281949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281949"
},
{
"category": "external",
"summary": "2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "2282394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282394"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282719"
},
{
"category": "external",
"summary": "2282743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282743"
},
{
"category": "external",
"summary": "2282772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282772"
},
{
"category": "external",
"summary": "2282887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282887"
},
{
"category": "external",
"summary": "2283463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283463"
},
{
"category": "external",
"summary": "2283894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283894"
},
{
"category": "external",
"summary": "2284496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284496"
},
{
"category": "external",
"summary": "2293078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293078"
},
{
"category": "external",
"summary": "2293348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293348"
},
{
"category": "external",
"summary": "2293367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293367"
},
{
"category": "external",
"summary": "2293420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293420"
},
{
"category": "external",
"summary": "2293653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293653"
},
{
"category": "external",
"summary": "2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "2300488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300488"
},
{
"category": "external",
"summary": "2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6993.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-12-23T21:11:47+00:00",
"generator": {
"date": "2025-12-23T21:11:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:6993",
"initial_release_date": "2024-09-24T01:17:56+00:00",
"revision_history": [
{
"date": "2024-09-24T01:17:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T01:17:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-23T21:11:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.74.1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.74.1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-477.74.1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "perf-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "perf-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-477.74.1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-477.74.1.el8_8.src",
"product": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.src",
"product_id": "kernel-0:4.18.0-477.74.1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-477.74.1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-477.74.1.el8_8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"product_id": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-477.74.1.el8_8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "perf-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47356",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282394"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mISDN driver. This issue arises during the cleanup process, where a timer handler might still be running after the driver has been removed, which can lead to a use-after-free issue, potentially causing a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mISDN: fix possible use-after-free in HFC_cleanup()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can cause system crash but it requires a specific conditions to be triggered, including the concurrent removal of the driver and active timer operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47356"
},
{
"category": "external",
"summary": "RHBZ#2282394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47356"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47356-a3d4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47356-a3d4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mISDN: fix possible use-after-free in HFC_cleanup()"
},
{
"cve": "CVE-2021-47384",
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282356"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp \u0026 0x08) \u0026\u0026 (!(tmp \u0026 0x80)) \u0026\u0026 ((tmp \u0026 0x7) == ((tmp \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the impact is limited to system stability rather than unauthorized access or data exposure.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"category": "external",
"summary": "RHBZ#2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47468",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282887"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: Fix sleeping function called from invalid context\n\nThe driver can call card-\u003eisac.release() function from an atomic\ncontext.\n\nFix this by calling this function after releasing the lock.\n\nThe following log reveals it:\n\n[ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018\n[ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe\n[ 44.169574 ] INFO: lockdep is turned off.\n[ 44.169899 ] irq event stamp: 0\n[ 44.170160 ] hardirqs last enabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.170627 ] hardirqs last disabled at (0): [\u003cffffffff814209ed\u003e] copy_process+0x132d/0x3e00\n[ 44.171240 ] softirqs last enabled at (0): [\u003cffffffff81420a1a\u003e] copy_process+0x135a/0x3e00\n[ 44.171852 ] softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n[ 44.172318 ] Preemption disabled at:\n[ 44.172320 ] [\u003cffffffffa009b0a9\u003e] nj_release+0x69/0x500 [netjet]\n[ 44.174441 ] Call Trace:\n[ 44.174630 ] dump_stack_lvl+0xa8/0xd1\n[ 44.174912 ] dump_stack+0x15/0x17\n[ 44.175166 ] ___might_sleep+0x3a2/0x510\n[ 44.175459 ] ? nj_release+0x69/0x500 [netjet]\n[ 44.175791 ] __might_sleep+0x82/0xe0\n[ 44.176063 ] ? start_flush_work+0x20/0x7b0\n[ 44.176375 ] start_flush_work+0x33/0x7b0\n[ 44.176672 ] ? trace_irq_enable_rcuidle+0x85/0x170\n[ 44.177034 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177372 ] ? kasan_quarantine_put+0xaa/0x1f0\n[ 44.177711 ] __flush_work+0x11a/0x1a0\n[ 44.177991 ] ? flush_work+0x20/0x20\n[ 44.178257 ] ? lock_release+0x13c/0x8f0\n[ 44.178550 ] ? __kasan_check_write+0x14/0x20\n[ 44.178872 ] ? do_raw_spin_lock+0x148/0x360\n[ 44.179187 ] ? read_lock_is_recursive+0x20/0x20\n[ 44.179530 ] ? __kasan_check_read+0x11/0x20\n[ 44.179846 ] ? do_raw_spin_unlock+0x55/0x900\n[ 44.180168 ] ? ____kasan_slab_free+0x116/0x140\n[ 44.180505 ] ? _raw_spin_unlock_irqrestore+0x41/0x60\n[ 44.180878 ] ? skb_queue_purge+0x1a3/0x1c0\n[ 44.181189 ] ? kfree+0x13e/0x290\n[ 44.181438 ] flush_work+0x17/0x20\n[ 44.181695 ] mISDN_freedchannel+0xe8/0x100\n[ 44.182006 ] isac_release+0x210/0x260 [mISDNipac]\n[ 44.182366 ] nj_release+0xf6/0x500 [netjet]\n[ 44.182685 ] nj_remove+0x48/0x70 [netjet]\n[ 44.182989 ] pci_device_remove+0xa9/0x250",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: isdn: mISDN: Fix sleeping function called from invalid context",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47468"
},
{
"category": "external",
"summary": "RHBZ#2282887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282887"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47468",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47468"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47468-6c1b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47468-6c1b@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: isdn: mISDN: Fix sleeping function called from invalid context"
},
{
"cve": "CVE-2021-47566",
"cwe": {
"id": "CWE-501",
"name": "Trust Boundary Violation"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283463"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nproc/vmcore: fix clearing user buffer by properly using clear_user()\n\nTo clear a user buffer we cannot simply use memset, we have to use\nclear_user(). With a virtio-mem device that registers a vmcore_cb and\nhas some logically unplugged memory inside an added Linux memory block,\nI can easily trigger a BUG by copying the vmcore via \"cp\":\n\n systemd[1]: Starting Kdump Vmcore Save Service...\n kdump[420]: Kdump is using the default log level(3).\n kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[465]: saving vmcore-dmesg.txt complete\n kdump[467]: saving vmcore\n BUG: unable to handle page fault for address: 00007f2374e01000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0003) - permissions violation\n PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867\n Oops: 0003 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014\n RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86\n Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 \u003c49\u003e c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81\n RSP: 0018:ffffc9000073be08 EFLAGS: 00010212\n RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000\n RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008\n RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50\n R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000\n R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8\n FS: 00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0\n Call Trace:\n read_vmcore+0x236/0x2c0\n proc_reg_read+0x55/0xa0\n vfs_read+0x95/0x190\n ksys_read+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nSome x86-64 CPUs have a CPU feature called \"Supervisor Mode Access\nPrevention (SMAP)\", which is used to detect wrong access from the kernel\nto user buffers like this: SMAP triggers a permissions violation on\nwrong access. In the x86-64 variant of clear_user(), SMAP is properly\nhandled via clac()+stac().\n\nTo fix, properly use clear_user() when we\u0027re dealing with a user buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: proc/vmcore: fix clearing user buffer by properly using clear_user()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47566"
},
{
"category": "external",
"summary": "RHBZ#2283463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47566"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052453-CVE-2021-47566-12b8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052453-CVE-2021-47566-12b8@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: proc/vmcore: fix clearing user buffer by properly using clear_user()"
},
{
"cve": "CVE-2022-48638",
"cwe": {
"id": "CWE-588",
"name": "Attempt to Access Child of a Non-structure Pointer"
},
"discovery_date": "2024-04-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2277829"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel in which certain cgroup configurations could cause a kernel panic, resulting in a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48638"
},
{
"category": "external",
"summary": "RHBZ#2277829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48638"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48638",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48638"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48638-e1bd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48638-e1bd@gregkh/T"
}
],
"release_date": "2024-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory"
},
{
"cve": "CVE-2023-52434",
"discovery_date": "2024-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265285"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the smb client in the Linux kernel. A potential out-of-bounds error was seen in the smb2_parse_contexts() function. Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52434"
},
{
"category": "external",
"summary": "RHBZ#2265285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265285"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"
}
],
"release_date": "2024-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: smb: client: fix potential OOBs in smb2_parse_contexts()"
},
{
"cve": "CVE-2023-52439",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265271"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s uio subsystem. A use-after-free memory flaw in the uio_open functionality allows a local user to crash or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: uio: Fix use-after-free in uio_open",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The bug could happen only if uio being used (userspace driver core code that allows userspace programs easy access to kernel interrupts and memory locations, allowing some drivers to be written in userspace). Since the bug happens during loading or unloading of uio (that is privileged operation), the security impact is limited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52439"
},
{
"category": "external",
"summary": "RHBZ#2265271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u"
}
],
"release_date": "2024-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module uio from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: uio: Fix use-after-free in uio_open"
},
{
"cve": "CVE-2023-52522",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel that allows for potential store tearing within the neigh_periodic_work() function, meaning a write operation on a value is not protected properly and could result in inconsistencies if another process or thread reads from that value before the operation is complete.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix possible store tearing in neigh_periodic_work()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"category": "external",
"summary": "RHBZ#2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix possible store tearing in neigh_periodic_work()"
},
{
"cve": "CVE-2023-52784",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282772"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: stop the device in bond_setup_by_slave()\n\nCommit 9eed321cde22 (\"net: lapbether: only support ethernet devices\")\nhas been able to keep syzbot away from net/lapb, until today.\n\nIn the following splat [1], the issue is that a lapbether device has\nbeen created on a bonding device without members. Then adding a non\nARPHRD_ETHER member forced the bonding master to change its type.\n\nThe fix is to make sure we call dev_close() in bond_setup_by_slave()\nso that the potential linked lapbether devices (or any other devices\nhaving assumptions on the physical device) are removed.\n\nA similar bug has been addressed in commit 40baec225765\n(\"bonding: fix panic on non-ARPHRD_ETHER enslave failure\")\n\n[1]\nskbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0\nkernel BUG at net/core/skbuff.c:192 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic net/core/skbuff.c:188 [inline]\npc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nlr : skb_panic net/core/skbuff.c:188 [inline]\nlr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nsp : ffff800096a06aa0\nx29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000\nx26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea\nx23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140\nx20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100\nx17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001\nx14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00\nx8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c\nx2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086\nCall trace:\nskb_panic net/core/skbuff.c:188 [inline]\nskb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nskb_push+0xf0/0x108 net/core/skbuff.c:2446\nip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384\ndev_hard_header include/linux/netdevice.h:3136 [inline]\nlapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257\nlapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447\nlapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149\nlapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251\n__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326\nlapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nlapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nbond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332\nbond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539\ndev_ifsioc+0x754/0x9ac\ndev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786\nsock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217\nsock_ioctl+0x4e8/0x834 net/socket.c:1322\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bonding: stop the device in bond_setup_by_slave()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52784"
},
{
"category": "external",
"summary": "RHBZ#2282772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52784"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052154-CVE-2023-52784-80ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052154-CVE-2023-52784-80ad@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bonding: stop the device in bond_setup_by_slave()"
},
{
"cve": "CVE-2023-52811",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282743"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ibmvfc: Remove BUG_ON in the case of an empty event pool\n\nIn practice the driver should never send more commands than are allocated\nto a queue\u0027s event pool. In the unlikely event that this happens, the code\nasserts a BUG_ON, and in the case that the kernel is not configured to\ncrash on panic returns a junk event pointer from the empty event list\ncausing things to spiral from there. This BUG_ON is a historical artifact\nof the ibmvfc driver first being upstreamed, and it is well known now that\nthe use of BUG_ON is bad practice except in the most unrecoverable\nscenario. There is nothing about this scenario that prevents the driver\nfrom recovering and carrying on.\n\nRemove the BUG_ON in question from ibmvfc_get_event() and return a NULL\npointer in the case of an empty event pool. Update all call sites to\nibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate\nfailure or recovery action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52811"
},
{
"category": "external",
"summary": "RHBZ#2282743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52811"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52811-2a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52811-2a5f@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool"
},
{
"cve": "CVE-2023-52864",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282719"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp-\u003eprivate_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: platform/x86: wmi: Fix opening of char device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52864"
},
{
"category": "external",
"summary": "RHBZ#2282719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282719"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52864"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052118-CVE-2023-52864-15cd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052118-CVE-2023-52864-15cd@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: platform/x86: wmi: Fix opening of char device"
},
{
"cve": "CVE-2024-26665",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue occurs due to the improper handling of non-linear skbs (socket buffers) when calculating checksums for ICMPv6 PMTU error messages. This vulnerability can lead to out-of-bounds access, potentially causing memory corruption or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability, as it was already patched in the 9.4.0 release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"category": "external",
"summary": "RHBZ#2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error"
},
{
"cve": "CVE-2024-26698",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273117"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the hv_netvsc driver in the Linux kernel, where a race condition is present between the netvsc_probe() and netvsc_remove() functions. This race condition could lead to system hangs during network device removal.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8 Real Time (RT) kernel is not affected by this vulnerability due to the following configuration: \"# CONFIG_HYPERV is not set\".",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26698"
},
{
"category": "external",
"summary": "RHBZ#2273117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26698"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040338-CVE-2024-26698-36ac@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040338-CVE-2024-26698-36ac@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ext4_mb_find_by_goal() function in the Linux kernel. This issue could lead to memory corruption or crashes due to the allocation of blocks from a group with a corrupted block bitmap.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26772"
},
{
"category": "external",
"summary": "RHBZ#2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()"
},
{
"cve": "CVE-2024-26826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275604"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A logical error in the Multipath TCP packet manager causes some packets intended for retransmission to be lost, resulting in a potential denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix data re-injection from stale subflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26826"
},
{
"category": "external",
"summary": "RHBZ#2275604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26826"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26826-b984@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26826-b984@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix data re-injection from stale subflow"
},
{
"cve": "CVE-2024-26851",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275750"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the netfilter subsystem of the Linux kernel, specifically in the `nf_conntrack_h323` module. This issue involves inadequate protection for BMP length values, potentially leading to out-of-range conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26851"
},
{
"category": "external",
"summary": "RHBZ#2275750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26851"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26851-4652@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26851-4652@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range"
},
{
"cve": "CVE-2024-26908",
"cwe": {
"id": "CWE-690",
"name": "Unchecked Return Value to NULL Pointer Dereference"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275744"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: Add some null pointer checking to smp.c\n\nThe Linux kernel CVE team has assigned CVE-2024-26908 to this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/xen: Add some null pointer checking to smp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected upstream:- https://lore.kernel.org/linux-cve-announce/2024043042-REJECTED-6155@gregkh/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26908"
},
{
"category": "external",
"summary": "RHBZ#2275744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26908"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26908",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26908"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041747-CVE-2024-26908-4690@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041747-CVE-2024-26908-4690@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/xen: Add some null pointer checking to smp.c"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2277171"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the management of inter-process communication uses AF_UNIX sockets. The issue arises from a race condition where a partially initialized socket with specific permissions carrying SCM_RIGHTS is improperly handled during garbage collection. This situation leads to an incorrect count of active sockets, potentially causing resources to remain unaccounted for and never released.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: af_unix: Fix garbage collector racing against connect()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Moderate due to the worst-case scenario resulting in a resource consumption attack. Considering this is a timing attack and is hard to replicate outside of very controlled environments, the vulnerability is not rated higher.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "RHBZ#2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"
}
],
"release_date": "2024-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "There are no known mitigations to this issue and updating to the latest Linux kernel version is recommended to address this vulnerability\u200b.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: af_unix: Fix garbage collector racing against connect()"
},
{
"cve": "CVE-2024-27019",
"discovery_date": "2024-05-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278258"
}
],
"notes": [
{
"category": "description",
"text": "A potential data-race flaw was found in __nft_obj_type_get() in the Linux kernel. This issue can lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27019"
},
{
"category": "external",
"summary": "RHBZ#2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()"
},
{
"cve": "CVE-2024-27020",
"discovery_date": "2024-05-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A potential data-race in the __nft_expr_type_get() function exists.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27020"
},
{
"category": "external",
"summary": "RHBZ#2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()"
},
{
"cve": "CVE-2024-27399",
"discovery_date": "2024-05-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2280462"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan-\u003econn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[ 472.074580] ==================================================================\n[ 472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[ 472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[ 472.075308]\n[ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.075308] Workqueue: events l2cap_chan_timeout\n[ 472.075308] Call Trace:\n[ 472.075308] \u003cTASK\u003e\n[ 472.075308] dump_stack_lvl+0x137/0x1a0\n[ 472.075308] print_report+0x101/0x250\n[ 472.075308] ? __virt_addr_valid+0x77/0x160\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_report+0x139/0x170\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_check_range+0x2c3/0x2e0\n[ 472.075308] mutex_lock+0x68/0xc0\n[ 472.075308] l2cap_chan_timeout+0x181/0x300\n[ 472.075308] process_one_work+0x5d2/0xe00\n[ 472.075308] worker_thread+0xe1d/0x1660\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] kthread+0x2b7/0x350\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork+0x4d/0x80\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork_asm+0x11/0x20\n[ 472.075308] \u003c/TASK\u003e\n[ 472.075308] ==================================================================\n[ 472.094860] Disabling lock debugging due to kernel taint\n[ 472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 472.096136] #PF: supervisor write access in kernel mode\n[ 472.096136] #PF: error_code(0x0002) - not-present page\n[ 472.096136] PGD 0 P4D 0\n[ 472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.096136] Workqueue: events l2cap_chan_timeout\n[ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[ 472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[ 472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[ 472.096136] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[ 472.096136] Call Trace:\n[ 472.096136] \u003cTASK\u003e\n[ 472.096136] ? __die_body+0x8d/0xe0\n[ 472.096136] ? page_fault_oops+0x6b8/0x9a0\n[ 472.096136] ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[ 472.096136] ? do_user_addr_fault+0x1027/0x1340\n[ 472.096136] ? _printk+0x7a/0xa0\n[ 472.096136] ? mutex_lock+0x68/0xc0\n[ 472.096136] ? add_taint+0x42/0xd0\n[ 472.096136] ? exc_page_fault+0x6a/0x1b0\n[ 472.096136] ? asm_exc_page_fault+0x26/0x30\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] ? mutex_lock+0x88/0xc0\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] l2cap_chan_timeo\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27399"
},
{
"category": "external",
"summary": "RHBZ#2280462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27399"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051300-CVE-2024-27399-afa8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051300-CVE-2024-27399-afa8@gregkh/T"
}
],
"release_date": "2024-05-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout"
},
{
"cve": "CVE-2024-35898",
"discovery_date": "2024-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281669"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\n\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\nAnd thhere is not any protection when iterate over nf_tables_flowtables\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\ndata-race of nf_tables_flowtables list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\nnft_flowtable_type_get() to protect the entire type query process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35898"
},
{
"category": "external",
"summary": "RHBZ#2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()"
},
{
"cve": "CVE-2024-35969",
"discovery_date": "2024-05-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281900"
}
],
"notes": [
{
"category": "description",
"text": "This CVE addresses a race condition in the Linux kernel\u0027s IPv6 subsystem, specifically between the ipv6_get_ifaddr and ipv6_del_addr functions. This race condition can lead to use-after-free scenarios, potentially causing system instability or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35969"
},
{
"category": "external",
"summary": "RHBZ#2281900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35969"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35969",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35969"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35969-4a04@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052022-CVE-2024-35969-4a04@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr"
},
{
"cve": "CVE-2024-36005",
"discovery_date": "2024-05-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281949"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: honor table dormant flag from netdev release event path\n\nCheck for table dormant flag otherwise netdev release event path tries\nto unregister an already unregistered hook.\n\n[524854.857999] ------------[ cut here ]------------\n[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260\n[...]\n[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365\n[524854.858869] Workqueue: netns cleanup_net\n[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260\n[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff \u003c0f\u003e 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41\n[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246\n[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a\n[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438\n[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34\n[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005\n[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00\n[524854.858971] FS: 0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000\n[524854.858982] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0\n[524854.859000] Call Trace:\n[524854.859006] \u003cTASK\u003e\n[524854.859013] ? __warn+0x9f/0x1a0\n[524854.859027] ? __nf_unregister_net_hook+0x21a/0x260\n[524854.859044] ? report_bug+0x1b1/0x1e0\n[524854.859060] ? handle_bug+0x3c/0x70\n[524854.859071] ? exc_invalid_op+0x17/0x40\n[524854.859083] ? asm_exc_invalid_op+0x1a/0x20\n[524854.859100] ? __nf_unregister_net_hook+0x6a/0x260\n[524854.859116] ? __nf_unregister_net_hook+0x21a/0x260\n[524854.859135] nf_tables_netdev_event+0x337/0x390 [nf_tables]\n[524854.859304] ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]\n[524854.859461] ? packet_notifier+0xb3/0x360\n[524854.859476] ? _raw_spin_unlock_irqrestore+0x11/0x40\n[524854.859489] ? dcbnl_netdevice_event+0x35/0x140\n[524854.859507] ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]\n[524854.859661] notifier_call_chain+0x7d/0x140\n[524854.859677] unregister_netdevice_many_notify+0x5e1/0xae0",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36005"
},
{
"category": "external",
"summary": "RHBZ#2281949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36005"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36005-2336@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36005-2336@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path"
},
{
"cve": "CVE-2024-36016",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-05-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283894"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s `n_gsm` driver, affecting the `tty` subsystem. It occurs when switching between basic and advanced option modes in GSM multiplexing, leading to potential out-of-bounds memory writes. This happens because certain state variables, like `gsm-\u003elen` and `gsm-\u003estate`, are not properly reset during mode changes. The issue could result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36016"
},
{
"category": "external",
"summary": "RHBZ#2283894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36016",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36016"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052947-CVE-2024-36016-d30a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052947-CVE-2024-36016-d30a@gregkh/T"
}
],
"release_date": "2024-05-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()"
},
{
"cve": "CVE-2024-36270",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293653"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: tproxy: bail out if IP has been disabled on the device\n\nsyzbot reports:\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n[..]\nRIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62\nCall Trace:\n nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]\n nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168\n\n__in_dev_get_rcu() can return NULL, so check for this.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: tproxy: bail out if IP has been disabled on the device",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36270"
},
{
"category": "external",
"summary": "RHBZ#2293653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293653"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36270",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36270"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062135-CVE-2024-36270-f7f7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062135-CVE-2024-36270-f7f7@gregkh/T"
}
],
"release_date": "2024-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: tproxy: bail out if IP has been disabled on the device"
},
{
"cve": "CVE-2024-36929",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284496"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: core: reject skb_copy(_expand) for fraglist GSO skbs\n\nSKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become\ninvalid. Return NULL if such an skb is passed to skb_copy or\nskb_copy_expand, in order to prevent a crash on a potential later\ncall to skb_gso_segment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36929"
},
{
"category": "external",
"summary": "RHBZ#2284496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36929"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053041-CVE-2024-36929-0329@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053041-CVE-2024-36929-0329@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs"
},
{
"cve": "CVE-2024-36978",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293078"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s multiq qdisc functionality. This vulnerability allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is for a specific configuration when the multiq of qdisc is being used. It is not easy to trigger unless the user is privileged because, apart from enabling this specific configuration, some complex conditions have to happen.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36978"
},
{
"category": "external",
"summary": "RHBZ#2293078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293078"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36978"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061926-CVE-2024-36978-b4b8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061926-CVE-2024-36978-b4b8@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module sch_multiq from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune()"
},
{
"cve": "CVE-2024-38573",
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293420"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in cppc_cpufreq_get_rate() in the Linux kernel. This issue may result in a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cppc_cpufreq: Fix possible null pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38573"
},
{
"category": "external",
"summary": "RHBZ#2293420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293420"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38573"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38573-d4b6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38573-d4b6@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cppc_cpufreq: Fix possible null pointer dereference"
},
{
"cve": "CVE-2024-38598",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293367"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix resync softlockup when bitmap size is less than array size\n\nIs is reported that for dm-raid10, lvextend + lvchange --syncaction will\ntrigger following softlockup:\n\nkernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]\nCPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1\nRIP: 0010:_raw_spin_unlock_irq+0x13/0x30\nCall Trace:\n \u003cTASK\u003e\n md_bitmap_start_sync+0x6b/0xf0\n raid10_sync_request+0x25c/0x1b40 [raid10]\n md_do_sync+0x64b/0x1020\n md_thread+0xa7/0x170\n kthread+0xcf/0x100\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1a/0x30\n\nAnd the detailed process is as follows:\n\nmd_do_sync\n j = mddev-\u003eresync_min\n while (j \u003c max_sectors)\n sectors = raid10_sync_request(mddev, j, \u0026skipped)\n if (!md_bitmap_start_sync(..., \u0026sync_blocks))\n // md_bitmap_start_sync set sync_blocks to 0\n return sync_blocks + sectors_skippe;\n // sectors = 0;\n j += sectors;\n // j never change\n\nRoot cause is that commit 301867b1c168 (\"md/raid10: check\nslab-out-of-bounds in md_bitmap_get_counter\") return early from\nmd_bitmap_get_counter(), without setting returned blocks.\n\nFix this problem by always set returned blocks from\nmd_bitmap_get_counter\"(), as it used to be.\n\nNoted that this patch just fix the softlockup problem in kernel, the\ncase that bitmap size doesn\u0027t match array size still need to be fixed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: md: fix resync softlockup when bitmap size is less than array size",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38598"
},
{
"category": "external",
"summary": "RHBZ#2293367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293367"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38598-8629@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38598-8629@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: md: fix resync softlockup when bitmap size is less than array size"
},
{
"cve": "CVE-2024-38615",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293348"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: exit() callback is optional\n\nThe exit() callback is optional and shouldn\u0027t be called without checking\na valid pointer first.\n\nAlso, we must clear freq_table pointer even if the exit() callback isn\u0027t\npresent.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cpufreq: exit() callback is optional",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38615"
},
{
"category": "external",
"summary": "RHBZ#2293348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38615"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38615-0d4c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38615-0d4c@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cpufreq: exit() callback is optional"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297579"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "RHBZ#2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300410"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb-\u003edestructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet\u0027s apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe \u003c0f\u003e 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"category": "external",
"summary": "RHBZ#2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppp: reject claimed-as-LCP but actually malformed packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "RHBZ#2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppp: reject claimed-as-LCP but actually malformed packets"
},
{
"cve": "CVE-2024-41071",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300448"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "RHBZ#2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "There are no mitigations for the flaw. Please update your system for fixes.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"title": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing"
},
{
"cve": "CVE-2024-41093",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: avoid using null object of framebuffer\n\nInstead of using state-\u003efb-\u003eobj[0] directly, get object from framebuffer\nby calling drm_gem_fb_get_obj() and return error code when object is\nnull to avoid using null object of framebuffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: avoid using null object of framebuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41093"
},
{
"category": "external",
"summary": "RHBZ#2300488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41093"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41093-9d6c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41093-9d6c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: avoid using null object of framebuffer"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s tcp_metrics.c, where insufficient validation of the length of the source address for TCP metrics could lead to incorrect memory read (out of boundary read).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp_metrics: validate source addr length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact level is limited, because:\n1. Missed check existed before and worked correctly (because by default it worked for int32 value, even if it was not specified exactly).\n2. Even if for some specific case fail could happen, still it can lead only to incorrect memory read.\n3. Even if memory corruption happens, it should not lead to anything apart from incorrect tcp-ip statistics output to the local user.\n4. This bug is restricted to local as netlink is configured to be local only out of the box.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"known_not_affected": [
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"category": "external",
"summary": "RHBZ#2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T01:17:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"BaseOS-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"BaseOS-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:bpftool-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.src",
"CRB-8.8.0.Z.EUS:kernel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-cross-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-core-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-doc-0:4.18.0-477.74.1.el8_8.noarch",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-headers-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-modules-extra-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-0:4.18.0-477.74.1.el8_8.x86_64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.aarch64",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.ppc64le",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.s390x",
"CRB-8.8.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-477.74.1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp_metrics: validate source addr length"
}
]
}
RHSA-2024_6753
Vulnerability from csaf_redhat - Published: 2024-09-18 11:46 - Updated: 2024-12-04 07:36Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)
* kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. (CVE-2022-48687)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: virtio-net: Add validation for used length (CVE-2021-47352)
* kernel: mm, thp: bail out early in collapse_file for writeback page (CVE-2021-47492)
* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)\n\n* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)\n\n* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)\n\n* kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. (CVE-2022-48687)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)\n\n* kernel: virtio-net: Add validation for used length (CVE-2021-47352)\n\n* kernel: mm, thp: bail out early in collapse_file for writeback page (CVE-2021-47492)\n\n* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6753",
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2273174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273174"
},
{
"category": "external",
"summary": "2273236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273236"
},
{
"category": "external",
"summary": "2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "2278930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278930"
},
{
"category": "external",
"summary": "2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282924"
},
{
"category": "external",
"summary": "2298412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298412"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6753.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-12-04T07:36:13+00:00",
"generator": {
"date": "2024-12-04T07:36:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:6753",
"initial_release_date": "2024-09-18T11:46:50+00:00",
"revision_history": [
{
"date": "2024-09-18T11:46:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-18T11:46:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-04T07:36:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.123.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.123.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47492",
"cwe": {
"id": "CWE-372",
"name": "Incomplete Internal State Distinction"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282924"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, thp: bail out early in collapse_file for writeback page\n\nCurrently collapse_file does not explicitly check PG_writeback, instead,\npage_has_private and try_to_release_page are used to filter writeback\npages. This does not work for xfs with blocksize equal to or larger\nthan pagesize, because in such case xfs has no page-\u003eprivate.\n\nThis makes collapse_file bail out early for writeback page. Otherwise,\nxfs end_page_writeback will panic as follows.\n\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32\n aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:\"libtest.so\"\n flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)\n raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8\n raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000\n page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u \u003c= 127u))\n page-\u003emem_cgroup:ffff0000c3e9a000\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:1212!\n Internal error: Oops - BUG: 0 [#1] SMP\n Modules linked in:\n BUG: Bad page state in process khugepaged pfn:84ef32\n xfs(E)\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32\n libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n Call trace:\n end_page_writeback+0x1c0/0x214\n iomap_finish_page_writeback+0x13c/0x204\n iomap_finish_ioend+0xe8/0x19c\n iomap_writepage_end_bio+0x38/0x50\n bio_endio+0x168/0x1ec\n blk_update_request+0x278/0x3f0\n blk_mq_end_request+0x34/0x15c\n virtblk_request_done+0x38/0x74 [virtio_blk]\n blk_done_softirq+0xc4/0x110\n __do_softirq+0x128/0x38c\n __irq_exit_rcu+0x118/0x150\n irq_exit+0x1c/0x30\n __handle_domain_irq+0x8c/0xf0\n gic_handle_irq+0x84/0x108\n el1_irq+0xcc/0x180\n arch_cpu_idle+0x18/0x40\n default_idle_call+0x4c/0x1a0\n cpuidle_idle_call+0x168/0x1e0\n do_idle+0xb4/0x104\n cpu_startup_entry+0x30/0x9c\n secondary_start_kernel+0x104/0x180\n Code: d4210000 b0006161 910c8021 94013f4d (d4210000)\n ---[ end trace 4a88c6a074082f8c ]---\n Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm, thp: bail out early in collapse_file for writeback page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47492"
},
{
"category": "external",
"summary": "RHBZ#2282924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282924"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47492"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052241-CVE-2021-47492-ee88@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052241-CVE-2021-47492-ee88@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm, thp: bail out early in collapse_file for writeback page"
},
{
"cve": "CVE-2022-48687",
"discovery_date": "2024-05-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278930"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found when setting HMAC data in net/ipv6/seg6.c in the Linux kernel. This issue may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fixed starting from Red Hat Enterprise Linux 9.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48687"
},
{
"category": "external",
"summary": "RHBZ#2278930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48687",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48687"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48687",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48687"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050344-CVE-2022-48687-b82e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050344-CVE-2022-48687-b82e@gregkh/T"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data."
},
{
"cve": "CVE-2024-26704",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273174"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This issue occurs in the ext4 function, in ext4_move_extents(), where an error in updating the moved_len variable can lead to double-free of blocks and corrupt block accounting. This could lead to crashes or undefined behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: fix double-free of blocks due to wrong extents moved_len",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because this issue could lead to ext4 file system crashes or undefined behavior on the system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26704"
},
{
"category": "external",
"summary": "RHBZ#2273174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26704"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: fix double-free of blocks due to wrong extents moved_len"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ext4_mb_find_by_goal() function in the Linux kernel. This issue could lead to memory corruption or crashes due to the allocation of blocks from a group with a corrupted block bitmap.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26772"
},
{
"category": "external",
"summary": "RHBZ#2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()"
},
{
"cve": "CVE-2024-26773",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273236"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ext4_mb_try_best_found() function in the Linux kernel. This issue could lead to memory corruption or crashes due to the allocation of blocks from a group with a corrupted block bitmap.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26773"
},
{
"category": "external",
"summary": "RHBZ#2273236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26773"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()"
},
{
"cve": "CVE-2024-27019",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278258"
}
],
"notes": [
{
"category": "description",
"text": "A potential data-race flaw was found in __nft_obj_type_get() in the Linux kernel. This issue can lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27019"
},
{
"category": "external",
"summary": "RHBZ#2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()"
},
{
"cve": "CVE-2024-27020",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A potential data-race in the __nft_expr_type_get() function exists.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27020"
},
{
"category": "external",
"summary": "RHBZ#2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()"
},
{
"cve": "CVE-2024-35898",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281669"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\n\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\nAnd thhere is not any protection when iterate over nf_tables_flowtables\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\ndata-race of nf_tables_flowtables list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\nnft_flowtable_type_get() to protect the entire type query process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35898"
},
{
"category": "external",
"summary": "RHBZ#2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()"
},
{
"cve": "CVE-2024-41009",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2024-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298412"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf: Fix overrunning reservations in ringbuf",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41009"
},
{
"category": "external",
"summary": "RHBZ#2298412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41009"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T"
}
],
"release_date": "2024-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf: Fix overrunning reservations in ringbuf"
}
]
}
RHSA-2024:6753
Vulnerability from csaf_redhat - Published: 2024-09-18 11:46 - Updated: 2025-11-21 19:12Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)
* kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. (CVE-2022-48687)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: virtio-net: Add validation for used length (CVE-2021-47352)
* kernel: mm, thp: bail out early in collapse_file for writeback page (CVE-2021-47492)
* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)\n\n* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)\n\n* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)\n\n* kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. (CVE-2022-48687)\n\n* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)\n\n* kernel: virtio-net: Add validation for used length (CVE-2021-47352)\n\n* kernel: mm, thp: bail out early in collapse_file for writeback page (CVE-2021-47492)\n\n* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6753",
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2273174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273174"
},
{
"category": "external",
"summary": "2273236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273236"
},
{
"category": "external",
"summary": "2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "2278930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278930"
},
{
"category": "external",
"summary": "2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282924"
},
{
"category": "external",
"summary": "2298412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298412"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6753.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T19:12:08+00:00",
"generator": {
"date": "2025-11-21T19:12:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:6753",
"initial_release_date": "2024-09-18T11:46:50+00:00",
"revision_history": [
{
"date": "2024-09-18T11:46:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-18T11:46:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:12:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.123.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.123.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.123.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47492",
"cwe": {
"id": "CWE-372",
"name": "Incomplete Internal State Distinction"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282924"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, thp: bail out early in collapse_file for writeback page\n\nCurrently collapse_file does not explicitly check PG_writeback, instead,\npage_has_private and try_to_release_page are used to filter writeback\npages. This does not work for xfs with blocksize equal to or larger\nthan pagesize, because in such case xfs has no page-\u003eprivate.\n\nThis makes collapse_file bail out early for writeback page. Otherwise,\nxfs end_page_writeback will panic as follows.\n\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32\n aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:\"libtest.so\"\n flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)\n raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8\n raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000\n page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u \u003c= 127u))\n page-\u003emem_cgroup:ffff0000c3e9a000\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:1212!\n Internal error: Oops - BUG: 0 [#1] SMP\n Modules linked in:\n BUG: Bad page state in process khugepaged pfn:84ef32\n xfs(E)\n page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32\n libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...\n pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n Call trace:\n end_page_writeback+0x1c0/0x214\n iomap_finish_page_writeback+0x13c/0x204\n iomap_finish_ioend+0xe8/0x19c\n iomap_writepage_end_bio+0x38/0x50\n bio_endio+0x168/0x1ec\n blk_update_request+0x278/0x3f0\n blk_mq_end_request+0x34/0x15c\n virtblk_request_done+0x38/0x74 [virtio_blk]\n blk_done_softirq+0xc4/0x110\n __do_softirq+0x128/0x38c\n __irq_exit_rcu+0x118/0x150\n irq_exit+0x1c/0x30\n __handle_domain_irq+0x8c/0xf0\n gic_handle_irq+0x84/0x108\n el1_irq+0xcc/0x180\n arch_cpu_idle+0x18/0x40\n default_idle_call+0x4c/0x1a0\n cpuidle_idle_call+0x168/0x1e0\n do_idle+0xb4/0x104\n cpu_startup_entry+0x30/0x9c\n secondary_start_kernel+0x104/0x180\n Code: d4210000 b0006161 910c8021 94013f4d (d4210000)\n ---[ end trace 4a88c6a074082f8c ]---\n Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm, thp: bail out early in collapse_file for writeback page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47492"
},
{
"category": "external",
"summary": "RHBZ#2282924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282924"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47492"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052241-CVE-2021-47492-ee88@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052241-CVE-2021-47492-ee88@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm, thp: bail out early in collapse_file for writeback page"
},
{
"cve": "CVE-2022-48687",
"discovery_date": "2024-05-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278930"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found when setting HMAC data in net/ipv6/seg6.c in the Linux kernel. This issue may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fixed starting from Red Hat Enterprise Linux 9.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48687"
},
{
"category": "external",
"summary": "RHBZ#2278930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278930"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48687",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48687"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48687",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48687"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050344-CVE-2022-48687-b82e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050344-CVE-2022-48687-b82e@gregkh/T"
}
],
"release_date": "2024-05-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data."
},
{
"cve": "CVE-2024-26704",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273174"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This issue occurs in the ext4 function, in ext4_move_extents(), where an error in updating the moved_len variable can lead to double-free of blocks and corrupt block accounting. This could lead to crashes or undefined behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: fix double-free of blocks due to wrong extents moved_len",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because this issue could lead to ext4 file system crashes or undefined behavior on the system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26704"
},
{
"category": "external",
"summary": "RHBZ#2273174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26704",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26704"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: fix double-free of blocks due to wrong extents moved_len"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ext4_mb_find_by_goal() function in the Linux kernel. This issue could lead to memory corruption or crashes due to the allocation of blocks from a group with a corrupted block bitmap.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26772"
},
{
"category": "external",
"summary": "RHBZ#2273242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()"
},
{
"cve": "CVE-2024-26773",
"cwe": {
"id": "CWE-229",
"name": "Improper Handling of Values"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273236"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ext4_mb_try_best_found() function in the Linux kernel. This issue could lead to memory corruption or crashes due to the allocation of blocks from a group with a corrupted block bitmap.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26773"
},
{
"category": "external",
"summary": "RHBZ#2273236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26773"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()"
},
{
"cve": "CVE-2024-27019",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278258"
}
],
"notes": [
{
"category": "description",
"text": "A potential data-race flaw was found in __nft_obj_type_get() in the Linux kernel. This issue can lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27019"
},
{
"category": "external",
"summary": "RHBZ#2278258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27019"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()"
},
{
"cve": "CVE-2024-27020",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278256"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A potential data-race in the __nft_expr_type_get() function exists.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27020"
},
{
"category": "external",
"summary": "RHBZ#2278256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27020"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()"
},
{
"cve": "CVE-2024-35898",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281669"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\n\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\nAnd thhere is not any protection when iterate over nf_tables_flowtables\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\ndata-race of nf_tables_flowtables list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\nnft_flowtable_type_get() to protect the entire type query process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35898"
},
{
"category": "external",
"summary": "RHBZ#2281669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35898"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()"
},
{
"cve": "CVE-2024-41009",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2024-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298412"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf: Fix overrunning reservations in ringbuf",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-121: Stack-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by stack-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques are used to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41009"
},
{
"category": "external",
"summary": "RHBZ#2298412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41009"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T"
}
],
"release_date": "2024-07-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-18T11:46:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6753"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.AUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.AUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.E4S:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-aarch64-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-s390x-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-core-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-devel-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:kernel-zfcpdump-modules-extra-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:bpftool-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.src",
"BaseOS-8.6.0.Z.TUS:kernel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-abi-stablelists-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-cross-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-core-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-devel-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-doc-0:4.18.0-372.123.1.el8_6.noarch",
"BaseOS-8.6.0.Z.TUS:kernel-headers-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-modules-extra-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:kernel-tools-libs-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-0:4.18.0-372.123.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-372.123.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf: Fix overrunning reservations in ringbuf"
}
]
}
RHSA-2024_7000
Vulnerability from csaf_redhat - Published: 2024-09-24 02:39 - Updated: 2024-12-11 21:53Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system. \nSecurity Fix(es):\n\n CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7000",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "2265838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265838"
},
{
"category": "external",
"summary": "2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "2270103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270103"
},
{
"category": "external",
"summary": "2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "2275558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275558"
},
{
"category": "external",
"summary": "2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "2282648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282648"
},
{
"category": "external",
"summary": "2282669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282669"
},
{
"category": "external",
"summary": "2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "2282764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282764"
},
{
"category": "external",
"summary": "2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "2284511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284511"
},
{
"category": "external",
"summary": "2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "2284630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284630"
},
{
"category": "external",
"summary": "2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "2293414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293414"
},
{
"category": "external",
"summary": "2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "2300381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300381"
},
{
"category": "external",
"summary": "2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "2300439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300439"
},
{
"category": "external",
"summary": "2300440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300440"
},
{
"category": "external",
"summary": "2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "2300709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300709"
},
{
"category": "external",
"summary": "2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "2301543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301543"
},
{
"category": "external",
"summary": "2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "external",
"summary": "RHEL-31515",
"url": "https://issues.redhat.com/browse/RHEL-31515"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7000.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-12-11T21:53:31+00:00",
"generator": {
"date": "2024-12-11T21:53:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:7000",
"initial_release_date": "2024-09-24T02:39:02+00:00",
"revision_history": [
{
"date": "2024-09-24T02:39:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T02:39:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-11T21:53:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-553.22.1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-553.22.1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-553.22.1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "perf-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "perf-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-553.22.1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-553.22.1.el8_10.src",
"product": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.src",
"product_id": "kernel-0:4.18.0-553.22.1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-553.22.1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-553.22.1.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"product_id": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-553.22.1.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "perf-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46984",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266750"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to -\u003ebio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx\u0027s than the first one (i.e., if\nctx-\u003eindex_hw[hctx-\u003etype] \u003e hctx-\u003enr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type \u0027long unsigned int [128]\u0027\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n-\u003ebio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kyber: fix out of bounds access when preempted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46984"
},
{
"category": "external",
"summary": "RHBZ#2266750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: kyber: fix out of bounds access when preempted"
},
{
"cve": "CVE-2021-47097",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267925"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) stack memory access flaw was found in elantech_change_report_id in drivers/input/mouse/elantech.c in the Linux kernel\u2019s elantech module. This flaw allows a local attacker to crash the system or leak kernel internal information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47097"
},
{
"category": "external",
"summary": "RHBZ#2267925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()"
},
{
"cve": "CVE-2021-47101",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267916"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nasix: fix uninit-value in asix_mdio_read()\n\nasix_read_cmd() may read less than sizeof(smsr) bytes and in this case\nsmsr will be uninitialized.\n\nFail log:\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\nBUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\n asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: asix: fix uninit-value in asix_mdio_read()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47101"
},
{
"category": "external",
"summary": "RHBZ#2267916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T"
}
],
"release_date": "2024-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: asix: fix uninit-value in asix_mdio_read()"
},
{
"cve": "CVE-2021-47287",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282511"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv-\u003edriver.name before returning from\n__auxiliary_driver_register()",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47287"
},
{
"category": "external",
"summary": "RHBZ#2282511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47287"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail"
},
{
"cve": "CVE-2021-47289",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282508"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: fix NULL pointer dereference\n\nCommit 71f642833284 (\"ACPI: utils: Fix reference counting in\nfor_each_acpi_dev_match()\") started doing \"acpi_dev_put()\" on a pointer\nthat was possibly NULL. That fails miserably, because that helper\ninline function is not set up to handle that case.\n\nJust make acpi_dev_put() silently accept a NULL pointer, rather than\ncalling down to put_device() with an invalid offset off that NULL\npointer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: fix NULL pointer dereference",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47289"
},
{
"category": "external",
"summary": "RHBZ#2282508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47289"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ACPI: fix NULL pointer dereference"
},
{
"cve": "CVE-2021-47321",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282440"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the del_timer() function in the Linux kernel\u0027s watchdog driver. This issue occurs because the function does not wait for the timer handler to finish, which may lead to a situation where the handler runs after the driver that has been removed, causing a use-after-free issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue does not allow unauthorized access or data leakage, but it poses a risk of system instability and crashes. The potential for a use-after-free condition can disrupt normal operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47321"
},
{
"category": "external",
"summary": "RHBZ#2282440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47321"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()"
},
{
"cve": "CVE-2021-47338",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282422"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s fbmem subsystem. This issue arises when the system attempts to delete a video mode that is still in use, leading to potential use-after-free errors. This improper handling can result in system crashes or undefined behavior when accessing freed memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fbmem: Do not delete the mode that is still in use",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because this issue affects system reliability by potentially causing errors when video modes are incorrectly managed, but it does not compromise the system\u0027s overall security posture or data integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47338"
},
{
"category": "external",
"summary": "RHBZ#2282422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47338",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47338"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fbmem: Do not delete the mode that is still in use"
},
{
"cve": "CVE-2021-47352",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282401"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u2019s virtio-net driver, where the system does not properly validate the length of data provided by an untrusted device. This lack of validation could lead to data corruption if the length of the data is incorrect or maliciously crafted.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: Add validation for used length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it involves potential data corruption or loss, but requires exploitation through specific conditions involving untrusted devices and does not directly impact system confidentiality or integrity, but can lead to significant system disruptions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47352"
},
{
"category": "external",
"summary": "RHBZ#2282401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282401"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47352"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: virtio-net: Add validation for used length"
},
{
"cve": "CVE-2021-47383",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282357"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn\u0027t call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display-\u003evrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tty: Fix out-of-bound vmalloc access in imageblit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can lead to system crashes by accessing invalid memory addresses, it does not pose a direct threat to data security or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47383"
},
{
"category": "external",
"summary": "RHBZ#2282357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282357"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47383"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tty: Fix out-of-bound vmalloc access in imageblit"
},
{
"cve": "CVE-2021-47384",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282356"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp \u0026 0x08) \u0026\u0026 (!(tmp \u0026 0x80)) \u0026\u0026 ((tmp \u0026 0x7) == ((tmp \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the impact is limited to system stability rather than unauthorized access or data exposure.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47384"
},
{
"category": "external",
"summary": "RHBZ#2282356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47384"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47385",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282355"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val \u0026 0x08) \u0026\u0026 (!(val \u0026 0x80)) \u0026\u0026 ((val \u0026 0x7) == ((val \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can cause crashes and operational disruptions, it does not expose sensitive information or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47385"
},
{
"category": "external",
"summary": "RHBZ#2282355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47385"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47386",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282354"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val \u0026 0x08) \u0026\u0026 (!(val \u0026 0x80)) \u0026\u0026 ((val \u0026 0x7) == ((val \u003e\u003e 4) \u0026 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because the risk is linked to system crashes or unexpected behavior, which can disrupt normal operations but does not directly compromise sensitive data or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47386"
},
{
"category": "external",
"summary": "RHBZ#2282354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47386"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field"
},
{
"cve": "CVE-2021-47393",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282345"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs\n\nFan speed minimum can be enforced from sysfs. For example, setting\ncurrent fan speed to 20 is used to enforce fan speed to be at 100%\nspeed, 19 - to be not below 90% speed, etcetera. This feature provides\nability to limit fan speed according to some system wise\nconsiderations, like absence of some replaceable units or high system\nambient temperature.\n\nRequest for changing fan minimum speed is configuration request and can\nbe set only through \u0027sysfs\u0027 write procedure. In this situation value of\nargument \u0027state\u0027 is above nominal fan speed maximum.\n\nReturn non-zero code in this case to avoid\nthermal_cooling_device_stats_update() call, because in this case\nstatistics update violates thermal statistics table range.\nThe issues is observed in case kernel is configured with option\nCONFIG_THERMAL_STATISTICS.\n\nHere is the trace from KASAN:\n[ 159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444\n[ 159.545625] Call Trace:\n[ 159.548366] dump_stack+0x92/0xc1\n[ 159.552084] ? thermal_cooling_device_stats_update+0x7d/0xb0\n[ 159.635869] thermal_zone_device_update+0x345/0x780\n[ 159.688711] thermal_zone_device_set_mode+0x7d/0xc0\n[ 159.694174] mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]\n[ 159.700972] ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]\n[ 159.731827] mlxsw_thermal_init+0x763/0x880 [mlxsw_core]\n[ 160.070233] RIP: 0033:0x7fd995909970\n[ 160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ..\n[ 160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970\n[ 160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001\n[ 160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700\n[ 160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013\n[ 160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013\n[ 160.143671]\n[ 160.145338] Allocated by task 2924:\n[ 160.149242] kasan_save_stack+0x19/0x40\n[ 160.153541] __kasan_kmalloc+0x7f/0xa0\n[ 160.157743] __kmalloc+0x1a2/0x2b0\n[ 160.161552] thermal_cooling_device_setup_sysfs+0xf9/0x1a0\n[ 160.167687] __thermal_cooling_device_register+0x1b5/0x500\n[ 160.173833] devm_thermal_of_cooling_device_register+0x60/0xa0\n[ 160.180356] mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]\n[ 160.248140]\n[ 160.249807] The buggy address belongs to the object at ffff888116163400\n[ 160.249807] which belongs to the cache kmalloc-1k of size 1024\n[ 160.263814] The buggy address is located 64 bytes to the right of\n[ 160.263814] 1024-byte region [ffff888116163400, ffff888116163800)\n[ 160.277536] The buggy address belongs to the page:\n[ 160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160\n[ 160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0\n[ 160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)\n[ 160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0\n[ 160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000\n[ 160.327033] page dumped because: kasan: bad access detected\n[ 160.333270]\n[ 160.334937] Memory state around the buggy address:\n[ 160.356469] \u003effff888116163800: fc ..",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because it can disrupt system operation by causing crashes or unpredictable behaviour under specific conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47393"
},
{
"category": "external",
"summary": "RHBZ#2282345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47393"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs"
},
{
"cve": "CVE-2021-47412",
"cwe": {
"id": "CWE-388",
"name": "CWE-388"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282324"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel, where improper handling of block I/O requests when a block I/O request (bio) is not tracked, the kernel erroneously calls the rq_qos_ops-\u003edone_bio function, potentially leading to use-after-free issues. This situation can occurr when the request queue is accessed after it has been freed, resulting in possible kernel panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity, as the issue can cause kernel panics, leading to system crashes. However, it does not affect data confidentiality or integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47412"
},
{
"category": "external",
"summary": "RHBZ#2282324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47412"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: block: don\u0027t call rq_qos_ops-\u003edone_bio if the bio isn\u0027t tracked"
},
{
"cve": "CVE-2021-47432",
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282366"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Don\u0027t overflow in peek()\n\nWhen we started spreading new inode numbers throughout most of the 64\nbit inode space, that triggered some corner case bugs, in particular\nsome integer overflows related to the radix tree code. Oops.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47432"
},
{
"category": "external",
"summary": "RHBZ#2282366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282366"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47432"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: lib/generic-radix-tree.c: Don\u0027t overflow in peek()"
},
{
"cve": "CVE-2021-47441",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282851"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 \u003e /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003effff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47441"
},
{
"category": "external",
"summary": "RHBZ#2282851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282851"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47441"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: thermal: Fix out-of-bounds memory accesses"
},
{
"cve": "CVE-2021-47455",
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282903"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n hex dump (first 8 bytes):\n 70 74 70 30 00 00 00 00 ptp0....\n backtrace:\n [\u003c00000000312ed458\u003e] __kmalloc_track_caller+0x19f/0x3a0\n [\u003c0000000079f6e2ff\u003e] kvasprintf+0xb5/0x150\n [\u003c0000000026aae54f\u003e] kvasprintf_const+0x60/0x190\n [\u003c00000000f323a5f7\u003e] kobject_set_name_vargs+0x56/0x150\n [\u003c000000004e35abdd\u003e] dev_set_name+0xc0/0x100\n [\u003c00000000f20cfe25\u003e] ptp_clock_register+0x9f4/0xd30 [ptp]\n [\u003c000000008bb9f0de\u003e] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ptp: Fix possible memory leak in ptp_clock_register()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47455"
},
{
"category": "external",
"summary": "RHBZ#2282903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47455",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47455"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ptp: Fix possible memory leak in ptp_clock_register()"
},
{
"cve": "CVE-2021-47466",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282890"
}
],
"notes": [
{
"category": "description",
"text": "A potential memory leak was found in the Linux kernel, in kmem_cache_open(). This issue may lead to compromised confidentiality and availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47466"
},
{
"category": "external",
"summary": "RHBZ#2282890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47466"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47466"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm, slub: fix potential memoryleak in kmem_cache_open()"
},
{
"cve": "CVE-2021-47497",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282918"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has \u0027nbits\u0027 equal to a multiple of BITS_PER_BYTE the logic\n\n *p \u0026= GENMASK((cell-\u003enbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type \u0027unsigned long\u0027\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n dump_backtrace+0x0/0x170\n show_stack+0x24/0x30\n dump_stack_lvl+0x64/0x7c\n dump_stack+0x18/0x38\n ubsan_epilogue+0x10/0x54\n __ubsan_handle_shift_out_of_bounds+0x180/0x194\n __nvmem_cell_read+0x1ec/0x21c\n nvmem_cell_read+0x58/0x94\n nvmem_cell_read_variable_common+0x4c/0xb0\n nvmem_cell_read_variable_le_u32+0x40/0x100\n a6xx_gpu_init+0x170/0x2f4\n adreno_bind+0x174/0x284\n component_bind_all+0xf0/0x264\n msm_drm_bind+0x1d8/0x7a0\n try_to_bring_up_master+0x164/0x1ac\n __component_add+0xbc/0x13c\n component_add+0x20/0x2c\n dp_display_probe+0x340/0x384\n platform_probe+0xc0/0x100\n really_probe+0x110/0x304\n __driver_probe_device+0xb8/0x120\n driver_probe_device+0x4c/0xfc\n __device_attach_driver+0xb0/0x128\n bus_for_each_drv+0x90/0xdc\n __device_attach+0xc8/0x174\n device_initial_probe+0x20/0x2c\n bus_probe_device+0x40/0xa4\n deferred_probe_work_func+0x7c/0xb8\n process_one_work+0x128/0x21c\n process_scheduled_works+0x40/0x54\n worker_thread+0x1ec/0x2a8\n kthread+0x138/0x158\n ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47497"
},
{
"category": "external",
"summary": "RHBZ#2282918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47497"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells"
},
{
"cve": "CVE-2021-47527",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283424"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: core: fix transmit-buffer reset and memleak\n\nCommit 761ed4a94582 (\"tty: serial_core: convert uart_close to use\ntty_port_close\") converted serial core to use tty_port_close() but\nfailed to notice that the transmit buffer still needs to be freed on\nfinal close.\n\nNot freeing the transmit buffer means that the buffer is no longer\ncleared on next open so that any ioctl() waiting for the buffer to drain\nmight wait indefinitely (e.g. on termios changes) or that stale data can\nend up being transmitted in case tx is restarted.\n\nFurthermore, the buffer of any port that has been opened would leak on\ndriver unbind.\n\nNote that the port lock is held when clearing the buffer pointer due to\nthe ldisc race worked around by commit a5ba1d95e46e (\"uart: fix race\nbetween uart_put_char() and uart_shutdown()\").\n\nAlso note that the tty-port shutdown() callback is not called for\nconsole ports so it is not strictly necessary to free the buffer page\nafter releasing the lock (cf. d72402145ace (\"tty/serial: do not free\ntrasnmit buffer page under port lock\")).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: serial: core: fix transmit-buffer reset and memleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47527"
},
{
"category": "external",
"summary": "RHBZ#2283424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283424"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47527"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: serial: core: fix transmit-buffer reset and memleak"
},
{
"cve": "CVE-2021-47560",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283389"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mlxsw spectrum driver, where processing port up/down events leads to a NULL pointer dereference. This issue occurs when the driver fails to handle events for the CPU port, which exists but lacks a corresponding network device, resulting in system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum: Protect driver from buggy firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47560"
},
{
"category": "external",
"summary": "RHBZ#2283389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47560"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47560"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mlxsw: spectrum: Protect driver from buggy firmware"
},
{
"cve": "CVE-2021-47582",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293247"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value. If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0 state:D stack:23192 pid: 8700 ppid: 8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs\u0027s calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47582"
},
{
"category": "external",
"summary": "RHBZ#2293247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293247"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47582"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable"
},
{
"cve": "CVE-2021-47609",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "RHBZ#2293270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47609"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver"
},
{
"cve": "CVE-2022-48619",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258012"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in drivers/input/input.c in the Linux Kernel, where the input_set_capability() function mishandles scenarios where an event code is outside the bitmap. This issue can lead to a kernel panic when the event code exceeds the bitmap for the specified event type, which could allow an attacker to cause a kernel crash and potential disruption of services.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48619"
},
{
"category": "external",
"summary": "RHBZ#2258012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619"
},
{
"category": "external",
"summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
"url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: event code falling outside of a bitmap in input_set_capability() leads to panic"
},
{
"cve": "CVE-2022-48754",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293304"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: phylib: fix potential use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "RHBZ#2293304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293304"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48754"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: phylib: fix potential use-after-free"
},
{
"cve": "CVE-2022-48760",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293377"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "RHBZ#2293377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293377"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48760"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers"
},
{
"cve": "CVE-2022-48804",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298140"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48804"
},
{
"category": "external",
"summary": "RHBZ#2298140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298140"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48804"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vt_ioctl: fix array_index_nospec in vt_setactivate"
},
{
"cve": "CVE-2022-48836",
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298177"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n \u003cTASK\u003e\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: aiptek - properly check endpoint type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48836"
},
{
"category": "external",
"summary": "RHBZ#2298177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298177"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48836"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Input: aiptek - properly check endpoint type"
},
{
"cve": "CVE-2022-48866",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298640"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts\n\nSyzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.\nThe root case is in missing validation check of actual number of endpoints.\n\nCode should not blindly access usb_host_interface::endpoint array, since\nit may contain less endpoints than code expects.\n\nFix it by adding missing validaion check and print an error if\nnumber of endpoints do not match expected number",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48866"
},
{
"category": "external",
"summary": "RHBZ#2298640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48866"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258013"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability was found in the Linux Kernel. This issue occurs during the creation of a new netfilter table. The absence of safeguards in the nf_tables_newtable function against invalid nf_tables family (pf) values allows attackers to achieve unauthorized access. Exploitation occurs in two locations: the xt_find_target function in x_tables.c permits faking xt_af data, and the nf_logger_find_get function in nf_log.c can enable an attacker to use an invalid pf to dereference adjacent global data. By manipulating these values, an attacker could achieve unauthorized access beyond the intended boundaries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability can only be triggered locally and the attacker needs to be logged into the system. For these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6040"
},
{
"category": "external",
"summary": "RHBZ#2258013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6040"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/01/12/1",
"url": "https://www.openwall.com/lists/oss-security/2024/01/12/1"
}
],
"release_date": "2024-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()"
},
{
"cve": "CVE-2023-52470",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266358"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in alloc_workqueue in the Linux Kernel. Check the alloc_workqueue return value in radeon_crtc_init() to avoid null-ptr-deref.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null-ptr-deref in alloc_workqueue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52470"
},
{
"category": "external",
"summary": "RHBZ#2266358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
"url": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1",
"url": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41",
"url": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb",
"url": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
"url": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310",
"url": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85",
"url": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85"
},
{
"category": "external",
"summary": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
"url": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: null-ptr-deref in alloc_workqueue"
},
{
"cve": "CVE-2023-52476",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267041"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n __insn_get_emulate_prefix()\n insn_get_emulate_prefix()\n insn_get_prefixes()\n insn_get_opcode()\n decode_branch_type()\n get_branch_type()\n intel_pmu_lbr_filter()\n intel_pmu_handle_irq()\n perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n (insn)-\u003enext_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/x86/lbr: Filter vsyscall addresses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52476"
},
{
"category": "external",
"summary": "RHBZ#2267041",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267041"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52476",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/x86/lbr: Filter vsyscall addresses"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-02-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267036"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue can cause a potential crash on the receiver USB disconnect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52478"
},
{
"category": "external",
"summary": "RHBZ#2267036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267036"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u"
}
],
"release_date": "2024-02-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect"
},
{
"cve": "CVE-2023-52522",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel that allows for potential store tearing within the neigh_periodic_work() function, meaning a write operation on a value is not protected properly and could result in inconsistencies if another process or thread reads from that value before the operation is complete.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix possible store tearing in neigh_periodic_work()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52522"
},
{
"category": "external",
"summary": "RHBZ#2267795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"
}
],
"release_date": "2024-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix possible store tearing in neigh_periodic_work()"
},
{
"cve": "CVE-2023-52605",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268295"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A NULL pointer dereference issue was identified in the Linux kernel within the ACPI subsystem\u0027s extlog module. In the extlog_exit() function, the extlog_l1_addr pointer was dereferenced before verifying if it was NULL, potentially causing system instability or crashes during the cleanup process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: extlog: fix NULL pointer dereference check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected upstream:- https://lore.kernel.org/linux-cve-announce/20240318151025.2952751-2-lee@kernel.org/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52605"
},
{
"category": "external",
"summary": "RHBZ#2268295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52605"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T"
}
],
"release_date": "2024-03-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: extlog: fix NULL pointer dereference check"
},
{
"cve": "CVE-2023-52683",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281317"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (\u003e UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52683"
},
{
"category": "external",
"summary": "RHBZ#2281317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52683"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: LPIT: Avoid u32 multiplication overflow"
},
{
"cve": "CVE-2023-52798",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282648"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix dfs radar event locking\n\nThe ath11k active pdevs are protected by RCU but the DFS radar event\nhandling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: ath11k: fix dfs radar event locking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52798"
},
{
"category": "external",
"summary": "RHBZ#2282648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52798"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52798",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52798"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52798-374e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52798-374e@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: ath11k: fix dfs radar event locking"
},
{
"cve": "CVE-2023-52800",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282764"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix htt pktlog locking\n\nThe ath11k active pdevs are protected by RCU but the htt pktlog handling\ncode calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: ath11k: fix htt pktlog locking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52800"
},
{
"category": "external",
"summary": "RHBZ#2282764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282764"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52800"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052159-CVE-2023-52800-63da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052159-CVE-2023-52800-63da@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: ath11k: fix htt pktlog locking"
},
{
"cve": "CVE-2023-52809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282669"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()\n\nfc_lport_ptp_setup() did not check the return value of fc_rport_create()\nwhich can return NULL and would cause a NULL pointer dereference. Address\nthis issue by checking return value of fc_rport_create() and log error\nmessage on fc_rport_create() failed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52809"
},
{
"category": "external",
"summary": "RHBZ#2282669",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282669"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52809"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52809-f07c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52809-f07c@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282676"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] \u003cTASK\u003e\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] \u003c/TASK\u003e\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52817"
},
{
"category": "external",
"summary": "RHBZ#2282676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52817"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282757"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()\n\nThe put_device() calls rmi_release_function() which frees \"fn\" so the\ndereference on the next line \"fn-\u003enum_of_irqs\" is a use after free.\nMove the put_device() to the end to fix this.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52840"
},
{
"category": "external",
"summary": "RHBZ#2282757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52840"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()"
},
{
"cve": "CVE-2024-23848",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2260038"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. A use-after-free exists in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cec_queue_msg_fh",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23848"
},
{
"category": "external",
"summary": "RHBZ#2260038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23848"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/",
"url": "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cec_queue_msg_fh"
},
{
"cve": "CVE-2024-26595",
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265799"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where a faulty error handler in the driver for certain Mellanox hardware could lead to a null pointer reference. This issue affects system stability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26595"
},
{
"category": "external",
"summary": "RHBZ#2265799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26595"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u"
}
],
"release_date": "2024-02-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "No mitigation is currently available for this vulnerability. Make sure to perform the updates as they become available.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path"
},
{
"cve": "CVE-2024-26600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265838"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel in the phy-omap-usb2 driver. This issue arises when the external PHY used with phy-omap-usb2 does not implement the send_srp() function. If this function is called without proper implementation, it can result in a system crash, especially during operations like waking up an idle Ethernet gadget.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "CVE-2024-26600 is rated as a Low severity because the vulnerability involves a NULL pointer dereference in the phy-omap-usb2 driver, leading to a kernel crash only under specific conditions where the external PHY lacks the send_srp() implementation. This issue does not allow for arbitrary code execution or privilege escalation, limiting its impact to a denial of service (DoS) condition that affects system stability but not security integrity. The specific hardware and configuration requirements further reduce the likelihood of widespread exploitation, justifying its classification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26600"
},
{
"category": "external",
"summary": "RHBZ#2265838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265838"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022405-CVE-2024-26600-44a2@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022405-CVE-2024-26600-44a2@gregkh/T/#u"
}
],
"release_date": "2024-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP"
},
{
"cve": "CVE-2024-26638",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270103"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: always initialize struct msghdr completely\n\nsyzbot complains that msg-\u003emsg_get_inq value can be uninitialized [1]\n\nstruct msghdr got many new fields recently, we should always make\nsure their values is zero by default.\n\n[1]\n BUG: KMSAN: uninit-value in tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n inet_recvmsg+0x131/0x580 net/ipv4/af_inet.c:879\n sock_recvmsg_nosec net/socket.c:1044 [inline]\n sock_recvmsg+0x12b/0x1e0 net/socket.c:1066\n __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538\n nbd_read_reply drivers/block/nbd.c:732 [inline]\n recv_work+0x262/0x3100 drivers/block/nbd.c:863\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700\n worker_thread+0xf45/0x1490 kernel/workqueue.c:2781\n kthread+0x3ed/0x540 kernel/kthread.c:388\n ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n\nLocal variable msg created at:\n __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513\n nbd_read_reply drivers/block/nbd.c:732 [inline]\n recv_work+0x262/0x3100 drivers/block/nbd.c:863\n\nCPU: 1 PID: 7465 Comm: kworker/u5:1 Not tainted 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: nbd5-recv recv_work",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nbd: always initialize struct msghdr completely",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26638"
},
{
"category": "external",
"summary": "RHBZ#2270103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26638"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26638",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26638"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240318101458.2835626-16-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240318101458.2835626-16-lee@kernel.org/T"
}
],
"release_date": "2024-03-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nbd: always initialize struct msghdr completely"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271648"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Ensure visibility when inserting an element into tracing_map\n\nRunning the following two commands in parallel on a multi-processor\nAArch64 machine can sporadically produce an unexpected warning about\nduplicate histogram entries:\n\n $ while true; do\n echo hist:key=id.syscall:val=hitcount \u003e \\\n /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger\n cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist\n sleep 0.001\n done\n $ stress-ng --sysbadaddr $(nproc)\n\nThe warning looks as follows:\n\n[ 2911.172474] ------------[ cut here ]------------\n[ 2911.173111] Duplicates detected: 1\n[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408\n[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)\n[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1\n[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G E 6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01\n[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018\n[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.185310] sp : ffff8000a1513900\n[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001\n[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008\n[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180\n[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff\n[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8\n[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731\n[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c\n[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8\n[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000\n[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480\n[ 2911.194259] Call trace:\n[ 2911.194626] tracing_map_sort_entries+0x3e0/0x408\n[ 2911.195220] hist_show+0x124/0x800\n[ 2911.195692] seq_read_iter+0x1d4/0x4e8\n[ 2911.196193] seq_read+0xe8/0x138\n[ 2911.196638] vfs_read+0xc8/0x300\n[ 2911.197078] ksys_read+0x70/0x108\n[ 2911.197534] __arm64_sys_read+0x24/0x38\n[ 2911.198046] invoke_syscall+0x78/0x108\n[ 2911.198553] el0_svc_common.constprop.0+0xd0/0xf8\n[ 2911.199157] do_el0_svc+0x28/0x40\n[ 2911.199613] el0_svc+0x40/0x178\n[ 2911.200048] el0t_64_sync_handler+0x13c/0x158\n[ 2911.200621] el0t_64_sync+0x1a8/0x1b0\n[ 2911.201115] ---[ end trace 0000000000000000 ]---\n\nThe problem appears to be caused by CPU reordering of writes issued from\n__tracing_map_insert().\n\nThe check for the presence of an element with a given key in this\nfunction is:\n\n val = READ_ONCE(entry-\u003eval);\n if (val \u0026\u0026 keys_match(key, val-\u003ekey, map-\u003ekey_size)) ...\n\nThe write of a new entry is:\n\n elt = get_free_elt(map);\n memcpy(elt-\u003ekey, key, map-\u003ekey_size);\n entry-\u003eval = elt;\n\nThe \"memcpy(elt-\u003ekey, key, map-\u003ekey_size);\" and \"entry-\u003eval = elt;\"\nstores may become visible in the reversed order on another CPU. This\nsecond CPU might then incorrectly determine that a new key doesn\u0027t match\nan already present val-\u003ekey and subse\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tracing: Ensure visibility when inserting an element into tracing_map",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26645"
},
{
"category": "external",
"summary": "RHBZ#2271648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tracing: Ensure visibility when inserting an element into tracing_map"
},
{
"cve": "CVE-2024-26649",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271796"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the drm/amdgpu driver of Linux Kernel, causing null pointer dereference when attempting to load RLC (Run-Length Coding) firmware. This issue arises if the firmware has an incorrect header size, causing premature release of the firmware pointer in amdgpu_ucode_request(), subsequently attempts to use the nullified pointer result in errors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: null pointer when load rlc firmware",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26649"
},
{
"category": "external",
"summary": "RHBZ#2271796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271796"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"
}
],
"release_date": "2024-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: null pointer when load rlc firmware"
},
{
"cve": "CVE-2024-26665",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue occurs due to the improper handling of non-linear skbs (socket buffers) when calculating checksums for ICMPv6 PMTU error messages. This vulnerability can lead to out-of-bounds access, potentially causing memory corruption or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 9 is not affected by this vulnerability, as it was already patched in the 9.4.0 release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26665"
},
{
"category": "external",
"summary": "RHBZ#2272793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T"
}
],
"release_date": "2024-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tunnels: fix out of bounds access when building IPv6 PMTU error"
},
{
"cve": "CVE-2024-26717",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273148"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid-of: fix NULL-deref on failed power up\n\nA while back the I2C HID implementation was split in an ACPI and OF\npart, but the new OF driver never initialises the client pointer which\nis dereferenced on power-up failures.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26717"
},
{
"category": "external",
"summary": "RHBZ#2273148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273148"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: HID: i2c-hid-of: fix NULL-deref on failed power up"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the wb_dirty_limits() function in the Linux kernel memory management (mm) subsystem which can lead to a divide-by-zero error. This issue could lead to a potential kernel crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because the conditions necessary to exploit it and cause a potential denial of service (DoS) would require specific conditions to manipulate the wb_dirty_limits() function in the context of global writeback operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26720"
},
{
"category": "external",
"summary": "RHBZ#2273141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
},
{
"cve": "CVE-2024-26769",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2273180"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-fc: avoid deadlock on delete association path",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26769"
},
{
"category": "external",
"summary": "RHBZ#2273180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26769"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvmet-fc: avoid deadlock on delete association path"
},
{
"cve": "CVE-2024-26846",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275558"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing \u0027left over IDs\u0027. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvme-fc: do not wait in vain when unloading module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26846"
},
{
"category": "external",
"summary": "RHBZ#2275558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275558"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26846"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041717-CVE-2024-26846-9593@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041717-CVE-2024-26846-9593@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: nvme-fc: do not wait in vain when unloading module"
},
{
"cve": "CVE-2024-26855",
"cwe": {
"id": "CWE-690",
"name": "Unchecked Return Value to NULL Pointer Dereference"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275742"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the ice_bridge_setlink() function in the Linux kernel. A missing check to verify whether the nlmsg_find_attr() function returns NULL or not could lead to a NULL pointer dereference, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26855"
},
{
"category": "external",
"summary": "RHBZ#2275742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26855"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26855"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()"
},
{
"cve": "CVE-2024-26880",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s device-mapper (dm) component. The issue arises during internal suspend operations where the resume method is not correctly called. This issue leads to problems such as list corruption, specifically observed when running the lvm2 test suite. The problem occurs because of two consecutive calls to the origin_postsuspend function, which results in attempts to remove an entry from a list that has already been removed, triggering a crash.\nThe kernel patch resolves this issue by ensuring that the preresume and resume methods are paired correctly during internal suspend and resume cycles. This prevents the list corruption and avoids the crash. The patch has been integrated into the kernel, and users are encouraged to update their systems to the latest version to ensure this vulnerability is mitigated.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: call the resume method on internal suspend",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26880"
},
{
"category": "external",
"summary": "RHBZ#2275690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26880"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: call the resume method on internal suspend"
},
{
"cve": "CVE-2024-26894",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2275661"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26894"
},
{
"category": "external",
"summary": "RHBZ#2275661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275661"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26894"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T"
}
],
"release_date": "2024-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2277171"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the management of inter-process communication uses AF_UNIX sockets. The issue arises from a race condition where a partially initialized socket with specific permissions carrying SCM_RIGHTS is improperly handled during garbage collection. This situation leads to an incorrect count of active sockets, potentially causing resources to remain unaccounted for and never released.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: af_unix: Fix garbage collector racing against connect()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Moderate due to the worst-case scenario resulting in a resource consumption attack. Considering this is a timing attack and is hard to replicate outside of very controlled environments, the vulnerability is not rated higher.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "RHBZ#2277171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26923"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"
}
],
"release_date": "2024-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "There are no known mitigations to this issue and updating to the latest Linux kernel version is recommended to address this vulnerability\u200b.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: af_unix: Fix garbage collector racing against connect()"
},
{
"cve": "CVE-2024-26939",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278220"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in drivers/gpu/drm/i915/i915_vma.c in the Linux kernel that may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/i915/vma: Fix UAF on destroy against retire race",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-26939"
},
{
"category": "external",
"summary": "RHBZ#2278220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/i915/vma: Fix UAF on destroy against retire race"
},
{
"cve": "CVE-2024-27013",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278270"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036 TASK: ffff949da6f20000 CPU: 23 COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n [exception RIP: io_serial_in+20]\n RIP: ffffffff89792594 RSP: ffffa655314979e8 RFLAGS: 00000002\n RAX: ffffffff89792500 RBX: ffffffff8af428a0 RCX: 0000000000000000\n RDX: 00000000000003fd RSI: 0000000000000005 RDI: ffffffff8af428a0\n RBP: 0000000000002710 R8: 0000000000000004 R9: 000000000000000f\n R10: 0000000000000000 R11: ffffffff8acbf64f R12: 0000000000000020\n R13: ffffffff8acbf698 R14: 0000000000000058 R15: 0000000000000000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tun: limit printing rate when illegal packet received by tun dev",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27013"
},
{
"category": "external",
"summary": "RHBZ#2278270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tun: limit printing rate when illegal packet received by tun dev"
},
{
"cve": "CVE-2024-27042",
"discovery_date": "2024-05-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2278447"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c in the Linux kernel. This issue may lead to a crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has protection mechanisms in place against buffer overflows such as FORTIFY_SOURCE, Position Independent Executables, or Stack Smashing Protection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27042"
},
{
"category": "external",
"summary": "RHBZ#2278447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278447"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T"
}
],
"release_date": "2024-05-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Fix potential out-of-bounds access in \u0026#39;amdgpu_discovery_reg_base_init()\u0026#39;"
},
{
"cve": "CVE-2024-35809",
"discovery_date": "2024-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281217"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the PCI subsystem in the Linux kernel, where runtime-idle callbacks are not always drained before a PCI driver is removed. If these callbacks are still active when the driver is removed, it could result in system instability or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35809"
},
{
"category": "external",
"summary": "RHBZ#2281217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281217"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35809"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T"
}
],
"release_date": "2024-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: PCI/PM: Drain runtime-idle callbacks before driver removal"
},
{
"cve": "CVE-2024-35877",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281720"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won\u0027t do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios. Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn\u0027t call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let\u0027s update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma-\u003evm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon\u0027t need the cachemode. We\u0027ll have to fail fork()-\u003etrack_pfn_copy() if\nthe first page was replaced by an anon folio, though: we\u0027d have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n\u003c--- C reproducer ---\u003e\n #include \u003cstdio.h\u003e\n #include \u003csys/mman.h\u003e\n #include \u003cunistd.h\u003e\n #include \u003cliburing.h\u003e\n\n int main(void)\n {\n struct io_uring_params p = {};\n int ring_fd;\n size_t size;\n char *map;\n\n ring_fd = io_uring_setup(1, \u0026p);\n if (ring_fd \u003c 0) {\n perror(\"io_uring_setup\");\n return 1;\n }\n size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n /* Map the submission queue ring MAP_PRIVATE */\n map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n ring_fd, IORING_OFF_SQ_RING);\n if (map == MAP_FAILED) {\n perror(\"mmap\");\n return 1;\n }\n\n /* We have at least one page. Let\u0027s COW it. */\n *map = 0;\n pause();\n return 0;\n }\n\u003c--- C reproducer ---\u003e\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring \u0026\n # memhog 16G\n # killall iouring\n[ 301.552930] ------------[ cut here ]------------\n[ 301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[ 301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[ 301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[ 301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[ 301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[ 301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[ 301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[ 301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[ 301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[ 301.565725] PKRU: 55555554\n[ 301.565944] Call Trace:\n[ 301.566148] \u003cTASK\u003e\n[ 301.566325] ? untrack_pfn+0xf4/0x100\n[ 301.566618] ? __warn+0x81/0x130\n[ 301.566876] ? untrack_pfn+0xf4/0x100\n[ 3\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35877"
},
{
"category": "external",
"summary": "RHBZ#2281720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281720"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35877"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/mm/pat: fix VM_PAT handling in COW mappings"
},
{
"cve": "CVE-2024-35884",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281704"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2024-35884 highlights a flaw in the Linux kernel\u0027s handling of UDP packets when Generic Receive Offload (GRO) forwarding is enabled. The issue occurs because non-tunnel UDP packets are sometimes mistakenly processed as if they belong to a tunnel. This can lead to data corruption or kernel crashes, particularly in environments with complex network configurations or when certain tunneling protocols like Geneve are used.\n\nThe kernel\u0027s processing logic for GRO and UDP packets fails to properly differentiate between tunneled and non-tunneled packets. As a result, improperly handled packets may lead to segmentation errors or system instability.\n\nThis vulnerability affects system availability and could result in crashes or data integrity issues during packet forwarding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35884"
},
{
"category": "external",
"summary": "RHBZ#2281704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35884"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel"
},
{
"cve": "CVE-2024-35944",
"discovery_date": "2024-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281807"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit \u0027WARNING in dg_dispatch_as_host\u0027 bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"\u0026dg_info-\u003emsg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-\u003epayload_size)\n/// This is 24 + payload_size\n\nmemcpy(\u0026dg_info-\u003emsg, dg, dg_size);\n\tDestination = dg_info-\u003emsg ---\u003e this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --\u003e this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36 struct datagram_entry *entry;\n 37 struct work_struct work;\n 38 bool in_dg_host_queue;\n 39 /* msg and msg_payload must be together. */\n 40 struct vmci_datagram msg;\n 41 u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35944"
},
{
"category": "external",
"summary": "RHBZ#2281807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35944"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T"
}
],
"release_date": "2024-05-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()"
},
{
"cve": "CVE-2024-35989",
"discovery_date": "2024-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2281847"
}
],
"notes": [
{
"category": "description",
"text": "This is a vulnerability in the Linux kernel\u0027s Data Movement Accelerator (DMA) engine, specifically affecting the Intel Data Streaming Accelerator (IDXD) driver. The issue arises during the removal (rmmod) of the idxd driver on systems with only one active CPU. In such scenarios, the driver\u0027s cleanup process attempts to migrate performance monitoring unit (PMU) contexts to another CPU. However, with no other CPUs available, this leads to a kernel oops\u2014a serious error causing the system to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-35989"
},
{
"category": "external",
"summary": "RHBZ#2281847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2281847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T"
}
],
"release_date": "2024-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms"
},
{
"cve": "CVE-2024-36883",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284271"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s networking subsystem in how a local user triggers a complex race condition. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: fix out-of-bounds access in ops_init",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36883"
},
{
"category": "external",
"summary": "RHBZ#2284271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36883"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: fix out-of-bounds access in ops_init"
},
{
"cve": "CVE-2024-36901",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284634"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 \u003c42\u003e 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS: 00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent NULL dereference in ip6_output()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36901"
},
{
"category": "external",
"summary": "RHBZ#2284634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent NULL dereference in ip6_output()"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284545"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 \u003c42\u003e 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS: 00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n ip6_route_output include/net/ip6_route.h:93 [inline]\n ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n sctp_connect net/sctp/socket.c:4819 [inline]\n sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n __sys_connect_file net/socket.c:2048 [inline]\n __sys_connect+0x2df/0x310 net/socket.c:2065\n __do_sys_connect net/socket.c:2075 [inline]\n __se_sys_connect net/socket.c:2072 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36902"
},
{
"category": "external",
"summary": "RHBZ#2284545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36902"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()"
},
{
"cve": "CVE-2024-36919",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284630"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won\u0027t be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[ 449.843143] ------------[ cut here ]------------\n[ 449.848302] kernel BUG at mm/vmalloc.c:2727!\n[ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[ 449.882910] RIP: 0010:vunmap+0x2e/0x30\n[ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 \u003c0f\u003e 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 449.993028] Call Trace:\n[ 449.995756] __iommu_dma_free+0x96/0x100\n[ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]\n[ 450.023103] process_one_work+0x1e8/0x3c0\n[ 450.027581] worker_thread+0x50/0x3b0\n[ 450.031669] ? rescuer_thread+0x370/0x370\n[ 450.036143] kthread+0x149/0x170\n[ 450.039744] ? set_kthread_struct+0x40/0x40\n[ 450.044411] ret_from_fork+0x22/0x30\n[ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[ 450.159753] ---[ end trace 712de2c57c64abc8 ]---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36919"
},
{
"category": "external",
"summary": "RHBZ#2284630",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284630"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36919"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload"
},
{
"cve": "CVE-2024-36920",
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284515"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Avoid memcpy field-spanning write WARNING\n\nWhen the \"storcli2 show\" command is executed for eHBA-9600, mpi3mr driver\nprints this WARNING message:\n\n memcpy: detected field-spanning write (size 128) of single field \"bsg_reply_buf-\u003ereply_buf\" at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size 1)\n WARNING: CPU: 0 PID: 12760 at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 mpi3mr_bsg_request+0x6b12/0x7f10 [mpi3mr]\n\nThe cause of the WARN is 128 bytes memcpy to the 1 byte size array \"__u8\nreplay_buf[1]\" in the struct mpi3mr_bsg_in_reply_buf. The array is intended\nto be a flexible length array, so the WARN is a false positive.\n\nTo suppress the WARN, remove the constant number \u00271\u0027 from the array\ndeclaration and clarify that it has flexible length. Also, adjust the\nmemory allocation size to match the change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36920"
},
{
"category": "external",
"summary": "RHBZ#2284515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36920"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING"
},
{
"cve": "CVE-2024-36922",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"discovery_date": "2024-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284511"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: read txq-\u003eread_ptr under lock\n\nIf we read txq-\u003eread_ptr without lock, we can read the same\nvalue twice, then obtain the lock, and reclaim from there\nto two different places, but crucially reclaim the same\nentry twice, resulting in the WARN_ONCE() a little later.\nFix that by reading txq-\u003eread_ptr under lock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: read txq-\u0026gt;read_ptr under lock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36922"
},
{
"category": "external",
"summary": "RHBZ#2284511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36922",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36922"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36922-f0df@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36922-f0df@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: read txq-\u0026gt;read_ptr under lock"
},
{
"cve": "CVE-2024-36939",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284628"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet\u0027s handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname \u0027nfs\u0027\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff \u003c0f\u003e 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS: 00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36939"
},
{
"category": "external",
"summary": "RHBZ#2284628",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284628"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36939"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init()."
},
{
"cve": "CVE-2024-36953",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2284596"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()\n\nvgic_v2_parse_attr() is responsible for finding the vCPU that matches\nthe user-provided CPUID, which (of course) may not be valid. If the ID\nis invalid, kvm_get_vcpu_by_id() returns NULL, which isn\u0027t handled\ngracefully.\n\nSimilar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()\nactually returns something and fail the ioctl if not.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-36953"
},
{
"category": "external",
"summary": "RHBZ#2284596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36953"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T"
}
],
"release_date": "2024-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293658"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n alpha -= min_not_zero(alpha, alpha \u003e\u003e dctcp_shift_g);\n ...\n delivered_ce \u003c\u003c= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n memcpy((void*)0x20000080,\n \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n /*flags=*/2ul, /*mode=*/0ul);\n memcpy((void*)0x20000000, \"100\\000\", 4);\n syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet\u0027s limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n # echo 10 \u003e /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n 10\n # echo 11 \u003e /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type \u0027u32\u0027 (aka \u0027unsigned int\u0027)\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37356"
},
{
"category": "external",
"summary": "RHBZ#2293658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37356"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T"
}
],
"release_date": "2024-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha()."
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293441"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc. Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an \u0027ipv6.nd\u0027 field. However, the \u0027ipv6\u0027 is a union that shares\nthe space between \u0027nd\u0027 and \u0027ct_orig\u0027 that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it\u0027s fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine. Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn\u0027t\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38558"
},
{
"category": "external",
"summary": "RHBZ#2293441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38558"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6"
},
{
"cve": "CVE-2024-38559",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293440"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "RHBZ#2293440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38559"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedf: Ensure the copied buf is NUL terminated"
},
{
"cve": "CVE-2024-38570",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293423"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix potential glock use-after-free on unmount\n\nWhen a DLM lockspace is released and there ares still locks in that\nlockspace, DLM will unlock those locks automatically. Commit\nfb6791d100d1b started exploiting this behavior to speed up filesystem\nunmount: gfs2 would simply free glocks it didn\u0027t want to unlock and then\nrelease the lockspace. This didn\u0027t take the bast callbacks for\nasynchronous lock contention notifications into account, which remain\nactive until until a lock is unlocked or its lockspace is released.\n\nTo prevent those callbacks from accessing deallocated objects, put the\nglocks that should not be unlocked on the sd_dead_glocks list, release\nthe lockspace, and only then free those glocks.\n\nAs an additional measure, ignore unexpected ast and bast callbacks if\nthe receiving glock is dead.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gfs2: Fix potential glock use-after-free on unmount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity due to its localized impact. Exploitation requires specific conditions during unmount, affecting stability without extensive security risks, as it impacts only the file system\u2019s lock management on unmount.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38570"
},
{
"category": "external",
"summary": "RHBZ#2293423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38570"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gfs2: Fix potential glock use-after-free on unmount"
},
{
"cve": "CVE-2024-38579",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - Fix pointer arithmetic\n\nIn spu2_dump_omd() value of ptr is increased by ciph_key_len\ninstead of hash_iv_len which could lead to going beyond the\nbuffer boundaries.\nFix this bug by changing ciph_key_len to hash_iv_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: bcm - Fix pointer arithmetic",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38579"
},
{
"category": "external",
"summary": "RHBZ#2293414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38579",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38579"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38579-e96a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38579-e96a@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: crypto: bcm - Fix pointer arithmetic"
},
{
"cve": "CVE-2024-38581",
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This issue is due to a possible use-after-free in drivers/gpu/drm/amd/amdgpu/amdgpu_mes.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu/mes: fix use-after-free issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38581"
},
{
"category": "external",
"summary": "RHBZ#2293408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38581"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu/mes: fix use-after-free issue"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293273"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n first initialization.\n- Add an error check for the return value of alauda_init_media().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb-storage: alauda: Check whether the media is initialized",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-38619"
},
{
"category": "external",
"summary": "RHBZ#2293273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38619"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: usb-storage: alauda: Check whether the media is initialized"
},
{
"cve": "CVE-2024-39471",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-06-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2294313"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39471"
},
{
"category": "external",
"summary": "RHBZ#2294313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294313"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39471"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T"
}
],
"release_date": "2024-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: add error handle to avoid out-of-bounds"
},
{
"cve": "CVE-2024-39499",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297471"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the event_deliver() function in the Linux kernel\u0027s VMCI component, where the issue involves a lack of sanitization for the event_data.event index controlled by user-space, which could lead to speculative information leaks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39499"
},
{
"category": "external",
"summary": "RHBZ#2297471",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297471"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39499"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()"
},
{
"cve": "CVE-2024-39501",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297473"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: core: synchronize really_probe() and dev_uevent()\n\nSynchronize the dev-\u003edriver usage in really_probe() and dev_uevent().\nThese can run in different threads, what can result in the following\nrace condition for dev-\u003edriver uninitialization:\n\nThread #1:\n==========\n\nreally_probe() {\n...\nprobe_failed:\n...\ndevice_unbind_cleanup(dev) {\n ...\n dev-\u003edriver = NULL; // \u003c= Failed probe sets dev-\u003edriver to NULL\n ...\n }\n...\n}\n\nThread #2:\n==========\n\ndev_uevent() {\n...\nif (dev-\u003edriver)\n // If dev-\u003edriver is NULLed from really_probe() from here on,\n // after above check, the system crashes\n add_uevent_var(env, \"DRIVER=%s\", dev-\u003edriver-\u003ename);\n...\n}\n\nreally_probe() holds the lock, already. So nothing needs to be done\nthere. dev_uevent() is called with lock held, often, too. But not\nalways. What implies that we can\u0027t add any locking in dev_uevent()\nitself. So fix this race by adding the lock to the non-protected\npath. This is the path where above race is observed:\n\n dev_uevent+0x235/0x380\n uevent_show+0x10c/0x1f0 \u003c= Add lock here\n dev_attr_show+0x3a/0xa0\n sysfs_kf_seq_show+0x17c/0x250\n kernfs_seq_show+0x7c/0x90\n seq_read_iter+0x2d7/0x940\n kernfs_fop_read_iter+0xc6/0x310\n vfs_read+0x5bc/0x6b0\n ksys_read+0xeb/0x1b0\n __x64_sys_read+0x42/0x50\n x64_sys_call+0x27ad/0x2d30\n do_syscall_64+0xcd/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nSimilar cases are reported by syzkaller in\n\nhttps://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a\n\nBut these are regarding the *initialization* of dev-\u003edriver\n\ndev-\u003edriver = drv;\n\nAs this switches dev-\u003edriver to non-NULL these reports can be considered\nto be false-positives (which should be \"fixed\" by this commit, as well,\nthough).\n\nThe same issue was reported and tried to be fixed back in 2015 in\n\nhttps://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/\n\nalready.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers: core: synchronize really_probe() and dev_uevent()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39501"
},
{
"category": "external",
"summary": "RHBZ#2297473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39501"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drivers: core: synchronize really_probe() and dev_uevent()"
},
{
"cve": "CVE-2024-39506",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297478"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t octeon_droq_dispatch_pkt\n\t octeon_create_recv_info\n\t ...search in the dispatch_list...\n\t -\u003edisp_fn(rdisp-\u003erinfo, ...)\n\t lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info-\u003epage to NULL.\nSo this check looks unneeded and doesn\u0027t solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can\u0027t do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39506"
},
{
"category": "external",
"summary": "RHBZ#2297478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297478"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39506"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet"
},
{
"cve": "CVE-2024-40901",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297706"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40901"
},
{
"category": "external",
"summary": "RHBZ#2297706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40901"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory"
},
{
"cve": "CVE-2024-40904",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver\u0027s immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#2: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#3: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#4: 98% system,\t 0% softirq,\t 3% hardirq,\t 0% idle\n\t#5: 98% system,\t 1% softirq,\t 3% hardirq,\t 0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last enabled at (73095): [\u003cffff80008037bc00\u003e] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [\u003cffff80008af10b00\u003e] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last enabled at (73048): [\u003cffff8000801ea530\u003e] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [\u003cffff800080020de8\u003e] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G W 6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls. Therefore we replace them with\ndev_err_ratelimited().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40904"
},
{
"category": "external",
"summary": "RHBZ#2297488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297488"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages"
},
{
"cve": "CVE-2024-40911",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297495"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Lock wiphy in cfg80211_get_station\n\nWiphy should be locked before calling rdev_get_station() (see lockdep\nassert in ieee80211_get_station()).\n\nThis fixes the following kernel NULL dereference:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n ESR = 0x0000000096000006\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x06: level 2 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000\n [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000\n Internal error: Oops: 0000000096000006 [#1] SMP\n Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath\n CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705\n Hardware name: RPT (r1) (DT)\n Workqueue: bat_events batadv_v_elp_throughput_metric_update\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n lr : sta_set_sinfo+0xcc/0xbd4\n sp : ffff000007b43ad0\n x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98\n x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000\n x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc\n x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000\n x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d\n x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e\n x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000\n x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000\n x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90\n x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000\n Call trace:\n ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n sta_set_sinfo+0xcc/0xbd4\n ieee80211_get_station+0x2c/0x44\n cfg80211_get_station+0x80/0x154\n batadv_v_elp_get_throughput+0x138/0x1fc\n batadv_v_elp_throughput_metric_update+0x1c/0xa4\n process_one_work+0x1ec/0x414\n worker_thread+0x70/0x46c\n kthread+0xdc/0xe0\n ret_from_fork+0x10/0x20\n Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)\n\nThis happens because STA has time to disconnect and reconnect before\nbatadv_v_elp_throughput_metric_update() delayed work gets scheduled. In\nthis situation, ath10k_sta_state() can be in the middle of resetting\narsta data when the work queue get chance to be scheduled and ends up\naccessing it. Locking wiphy prevents that.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40911"
},
{
"category": "external",
"summary": "RHBZ#2297495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40911"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station"
},
{
"cve": "CVE-2024-40912",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297496"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta-\u003eps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta-\u003eps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu: (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G W 6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n queued_spin_lock_slowpath+0x58/0x2d0\n ieee80211_tx+0x80/0x12c\n ieee80211_tx_pending+0x110/0x278\n tasklet_action_common.constprop.0+0x10c/0x144\n tasklet_action+0x20/0x28\n _stext+0x11c/0x284\n ____do_softirq+0xc/0x14\n call_on_irq_stack+0x24/0x34\n do_softirq_own_stack+0x18/0x20\n do_softirq+0x74/0x7c\n __local_bh_enable_ip+0xa0/0xa4\n _ieee80211_wake_txqs+0x3b0/0x4b8\n __ieee80211_wake_queue+0x12c/0x168\n ieee80211_add_pending_skbs+0xec/0x138\n ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n ieee80211_mps_sta_status_update+0x18/0x24\n sta_apply_parameters+0x3bc/0x4c0\n ieee80211_change_station+0x1b8/0x2dc\n nl80211_set_station+0x444/0x49c\n genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n genl_rcv_msg+0x1b0/0x244\n netlink_rcv_skb+0x38/0x10c\n genl_rcv+0x34/0x48\n netlink_unicast+0x254/0x2bc\n netlink_sendmsg+0x190/0x3b4\n ____sys_sendmsg+0x1e8/0x218\n ___sys_sendmsg+0x68/0x8c\n __sys_sendmsg+0x44/0x84\n __arm64_sys_sendmsg+0x20/0x28\n do_el0_svc+0x6c/0xe8\n el0_svc+0x14/0x48\n el0t_64_sync_handler+0xb0/0xb4\n el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40912"
},
{
"category": "external",
"summary": "RHBZ#2297496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40912"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()"
},
{
"cve": "CVE-2024-40929",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297513"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40929"
},
{
"category": "external",
"summary": "RHBZ#2297513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297513"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40929"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids"
},
{
"cve": "CVE-2024-40931",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297515"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_una is properly initialized on connect\n\nThis is strictly related to commit fb7a0d334894 (\"mptcp: ensure snd_nxt\nis properly initialized on connect\"). It turns out that syzkaller can\ntrigger the retransmit after fallback and before processing any other\nincoming packet - so that snd_una is still left uninitialized.\n\nAddress the issue explicitly initializing snd_una together with snd_nxt\nand write_seq.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: ensure snd_una is properly initialized on connect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40931"
},
{
"category": "external",
"summary": "RHBZ#2297515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297515"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40931"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: ensure snd_una is properly initialized on connect"
},
{
"cve": "CVE-2024-40941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don\u0027t read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won\u0027t see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40941"
},
{
"category": "external",
"summary": "RHBZ#2297525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40941"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: wifi: iwlwifi: mvm: don\u0026#39;t read past the mfuart notifcation"
},
{
"cve": "CVE-2024-40954",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297538"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n * attaching an fentry probe to __sock_release() and the probe calling the\n bpf_get_socket_cookie() helper\n * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G E 6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: do not leave a dangling sk pointer, when socket creation fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40954"
},
{
"category": "external",
"summary": "RHBZ#2297538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40954"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: do not leave a dangling sk pointer, when socket creation fails"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297542"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetns: Make get_net_ns() handle zero refcount net\n\nSyzkaller hit a warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0\nModules linked in:\nCPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xdf/0x1d0\nCode: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 \u003c0f\u003e 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1\nRSP: 0018:ffff8881067b7da0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac\nRDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001\nRBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139\nR10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4\nR13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040\nFS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0xa3/0xc0\n ? __warn+0xa5/0x1c0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? report_bug+0x1fc/0x2d0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? handle_bug+0xa1/0x110\n ? exc_invalid_op+0x3c/0xb0\n ? asm_exc_invalid_op+0x1f/0x30\n ? __warn_printk+0xcc/0x140\n ? __warn_printk+0xd5/0x140\n ? refcount_warn_saturate+0xdf/0x1d0\n get_net_ns+0xa4/0xc0\n ? __pfx_get_net_ns+0x10/0x10\n open_related_ns+0x5a/0x130\n __tun_chr_ioctl+0x1616/0x2370\n ? __sanitizer_cov_trace_switch+0x58/0xa0\n ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30\n ? __pfx_tun_chr_ioctl+0x10/0x10\n tun_chr_ioctl+0x2f/0x40\n __x64_sys_ioctl+0x11b/0x160\n x64_sys_call+0x1211/0x20d0\n do_syscall_64+0x9e/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5b28f165d7\nCode: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8\nRSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7\nRDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003\nRBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0\nR10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730\nR13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nThis is trigger as below:\n ns0 ns1\ntun_set_iff() //dev is tun0\n tun-\u003edev = dev\n//ip link set tun0 netns ns1\n put_net() //ref is 0\n__tun_chr_ioctl() //TUNGETDEVNETNS\n net = dev_net(tun-\u003edev);\n open_related_ns(\u0026net-\u003ens, get_net_ns); //ns1\n get_net_ns()\n get_net() //addition on 0\n\nUse maybe_get_net() in get_net_ns in case net\u0027s ref is zero to fix this",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netns: Make get_net_ns() handle zero refcount net",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40958"
},
{
"category": "external",
"summary": "RHBZ#2297542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40958"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netns: Make get_net_ns() handle zero refcount net"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297543"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n process_scheduled_works kernel/workqueue.c:3312 [inline]\n worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40959"
},
{
"category": "external",
"summary": "RHBZ#2297543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40959"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297544"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL dereference in rt6_probe()\n\nsyzbot caught a NULL dereference in rt6_probe() [1]\n\nBail out if __in6_dev_get() returns NULL.\n\n[1]\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]\nCPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]\n RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758\nCode: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19\nRSP: 0018:ffffc900034af070 EFLAGS: 00010203\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000\nRDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c\nRBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a\nR13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000\nFS: 00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784\n nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496\n __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825\n find_rr_leaf net/ipv6/route.c:853 [inline]\n rt6_select net/ipv6/route.c:897 [inline]\n fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195\n ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231\n pol_lookup_func include/net/ip6_fib.h:616 [inline]\n fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121\n ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]\n ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651\n ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147\n ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250\n rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898\n inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_write_iter+0x4b8/0x5c0 net/socket.c:1160\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x6b6/0x1140 fs/read_write.c:590\n ksys_write+0x1f8/0x260 fs/read_write.c:643\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40960"
},
{
"category": "external",
"summary": "RHBZ#2297544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40960"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipv6: prevent possible NULL dereference in rt6_probe()"
},
{
"cve": "CVE-2024-40972",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297556"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: do not create EA inode under buffer lock",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40972"
},
{
"category": "external",
"summary": "RHBZ#2297556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40972"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: do not create EA inode under buffer lock"
},
{
"cve": "CVE-2024-40977",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297561"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s mt76 driver for the mt7921s chip, where a potential deadlock could occur during chip recovery. This situation arises when the kernel worker reset_work holds a lock while waiting for the stat_worker thread, which is simultaneously waiting for the same lock to be released, which leads to hung tasks and may even result in device reboots.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40977"
},
{
"category": "external",
"summary": "RHBZ#2297561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40977"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery"
},
{
"cve": "CVE-2024-40978",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297562"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS: 00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedi: Fix crash while reading debugfs attribute",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40978"
},
{
"category": "external",
"summary": "RHBZ#2297562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297562"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40978"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: qedi: Fix crash while reading debugfs attribute"
},
{
"cve": "CVE-2024-40988",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297572"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40988"
},
{
"category": "external",
"summary": "RHBZ#2297572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297572"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40988"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: fix UBSAN warning in kv_dpm.c"
},
{
"cve": "CVE-2024-40989",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297573"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s KVM for ARM64 within the vgic-init.c, vgic-mmio-v3.c, and vgic.h files. The virtual vCPUs may retain dangling pointers in a redistributor region after they have been torn down, leading to potential memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40989"
},
{
"category": "external",
"summary": "RHBZ#2297573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40989"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297579"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n\u003cTASK\u003e\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40995"
},
{
"category": "external",
"summary": "RHBZ#2297579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40995"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()"
},
{
"cve": "CVE-2024-40997",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297581"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: fix memory leak on CPU EPP exit\n\nThe cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is\nnot freed in the analogous exit function, so fix that.\n\n[ rjw: Subject and changelog edits ]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40997"
},
{
"category": "external",
"summary": "RHBZ#2297581",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297581"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40997"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40997"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit"
},
{
"cve": "CVE-2024-40998",
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297582"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state-\u003elock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs-\u003elock:\n\next4_fill_super\n ext4_register_sysfs\n // sysfs registered msg_ratelimit_interval_ms\n // Other processes modify rs-\u003einterval to\n // non-zero via msg_ratelimit_interval_ms\n ext4_orphan_cleanup\n ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n __ext4_msg\n ___ratelimit(\u0026(EXT4_SB(sb)-\u003es_msg_ratelimit_state)\n if (!rs-\u003einterval) // do nothing if interval is 0\n return 1;\n raw_spin_trylock_irqsave(\u0026rs-\u003elock, flags)\n raw_spin_trylock(lock)\n _raw_spin_trylock\n __raw_spin_trylock\n spin_acquire(\u0026lock-\u003edep_map, 0, 1, _RET_IP_)\n lock_acquire\n __lock_acquire\n register_lock_class\n assign_lock_key\n dump_stack();\n ratelimit_state_init(\u0026sbi-\u003es_msg_ratelimit_state, 5 * HZ, 10);\n raw_spin_lock_init(\u0026rs-\u003elock);\n // init rs-\u003elock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn\u0027t initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs-\u003elock, so it is possible to change rs-\u003einterval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs-\u003elock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs-\u003elock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40998"
},
{
"category": "external",
"summary": "RHBZ#2297582",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297582"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40998"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: fix uninitialized ratelimit_state-\u0026gt;lock access in __ext4_fill_super()"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297589"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n\u003csnip\u003e\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n\u003csnip\u003e\n\tvalue changed: 0x0000000a -\u003e 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi-\u003epoll_owner\nnon atomically. The -\u003epoll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netpoll: Fix race condition in netpoll_owner_active",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41005"
},
{
"category": "external",
"summary": "RHBZ#2297589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41005"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T"
}
],
"release_date": "2024-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netpoll: Fix race condition in netpoll_owner_active"
},
{
"cve": "CVE-2024-41007",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2297909"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the tcp_retransmit_timer function in the Linux kernel\u0027s TCP implementation. This issue occurs when a TCP socket uses TCP_USER_TIMEOUT and the peer\u0027s window retracts to zero, leading to excessive retransmission of packets every two milliseconds for up to four minutes after the timeout, which can result in network congestion and performance degradation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: avoid too many retransmit packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41007"
},
{
"category": "external",
"summary": "RHBZ#2297909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41007"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T"
}
],
"release_date": "2024-07-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: avoid too many retransmit packets"
},
{
"cve": "CVE-2024-41008",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298079"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm-\u003etask_info handling\n\nThis patch changes the handling and lifecycle of vm-\u003etask_info object.\nThe major changes are:\n- vm-\u003etask_info is a dynamically allocated ptr now, and its uasge is\n reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n - amdgpu_vm_get_task_info: reference counts up task_info before\n returning this info\n - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm-\u003etask_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n - Fix wrong indentation\n - No debug message for -ENOMEM\n - Add NULL check for task_info\n - Do not duplicate the debug messages (ti vs no ti)\n - Get first reference of task_info in vm_init(), put last\n in vm_fini()\n\nV4: Fixed review comments from Felix\n - fix double reference increment in create_task_info\n - change amdgpu_vm_get_task_info_pasid\n - additional changes in amdgpu_gem.c while porting",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41008"
},
{
"category": "external",
"summary": "RHBZ#2298079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41008"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T",
"url": "https://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T"
}
],
"release_date": "2024-07-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdgpu: change vm-\u0026gt;task_info handling"
},
{
"cve": "CVE-2024-41012",
"discovery_date": "2024-07-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299452"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Remove locks reliably when fcntl/close race is detected\n\nWhen fcntl_setlk() races with close(), it removes the created lock with\ndo_lock_file_wait().\nHowever, LSMs can allow the first do_lock_file_wait() that created the lock\nwhile denying the second do_lock_file_wait() that tries to remove the lock.\nSeparately, posix_lock_file() could also fail to\nremove a lock due to GFP_KERNEL allocation failure (when splitting a range\nin the middle).\n\nAfter the bug has been triggered, use-after-free reads will occur in\nlock_get_status() when userspace reads /proc/locks. This can likely be used\nto read arbitrary kernel memory, but can\u0027t corrupt kernel memory.\n\nFix it by calling locks_remove_posix() instead, which is designed to\nreliably get rid of POSIX locks associated with the given file and\nfiles_struct and is also used by filp_flush().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: filelock: Remove locks reliably when fcntl/close race is detected",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41012"
},
{
"category": "external",
"summary": "RHBZ#2299452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299452"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41012"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T"
}
],
"release_date": "2024-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: filelock: Remove locks reliably when fcntl/close race is detected"
},
{
"cve": "CVE-2024-41013",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300296"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don\u0027t walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don\u0027t stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup-\u003elength to dup-\u003elength-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41013"
},
{
"category": "external",
"summary": "RHBZ#2300296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41013"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: don\u0026#39;t walk off the end of a directory data block"
},
{
"cve": "CVE-2024-41014",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300297"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n 1) Mount an image of xfs, and do some file operations to leave records\n 2) Before umounting, copy the image for subsequent steps to simulate\n abnormal exit. Because umount will ensure that tail_blk and\n head_blk are the same, which will result in the inability to enter\n xlog_recover_process_data\n 3) Write a tool to parse and modify the copied image in step 2\n 4) Make the end of the xlog_op_header entries only 1 byte away from\n xlog_rec_header-\u003eh_size\n 5) xlog_rec_header-\u003eh_num_logops++\n 6) Modify xlog_rec_header-\u003eh_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xfs: add bounds checking to xlog_recover_process_data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41014"
},
{
"category": "external",
"summary": "RHBZ#2300297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41014"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xfs: add bounds checking to xlog_recover_process_data"
},
{
"cve": "CVE-2024-41023",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300381"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n object hex dump (first 32 bytes):\n 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@..............\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n debug hex dump (first 16 bytes):\n 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S...............\n backtrace:\n [\u003c00000000046b6790\u003e] dup_task_struct+0x30/0x540\n [\u003c00000000c5ca0f0b\u003e] copy_process+0x3d9/0x50e0\n [\u003c00000000ced59777\u003e] kernel_clone+0xb0/0x770\n [\u003c00000000a50befdc\u003e] __do_sys_clone+0xb6/0xf0\n [\u003c000000001dbf2008\u003e] do_syscall_64+0x5d/0xf0\n [\u003c00000000552900ff\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sched/deadline: Fix task_struct reference leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41023"
},
{
"category": "external",
"summary": "RHBZ#2300381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41023"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072917-CVE-2024-41023-32a0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072917-CVE-2024-41023-32a0@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sched/deadline: Fix task_struct reference leak"
},
{
"cve": "CVE-2024-41035",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300402"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the usb_parse_endpoint() function in the Linux kernel\u0027s usb drivers, where improper handling of the reserved bits in an endpoint descriptor\u0027s bEndpointAddress field can lead to confusion in the endpoint_is_duplicate() routine in config.c. This will erroneously treat the same endpoint descriptors as distinct, given that the reserved bits are not properly cleared. This can potentially lead to unexpected behavior from connected USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41035"
},
{
"category": "external",
"summary": "RHBZ#2300402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41035"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor"
},
{
"cve": "CVE-2024-41038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300407"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41038"
},
{
"category": "external",
"summary": "RHBZ#2300407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41038"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers"
},
{
"cve": "CVE-2024-41039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300408"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s firmware driver cs_dsp.c, where a buffer overflow is possible in the wmfw header due to insufficient buffer size checks. The issue stems from the size of one of the structs that the code checks, the wmfw_adsp?_sizes struct, which can vary depending on whether the firmware used is ADSP1 or ADSP2 and Halo Core. In the second case, the wmfw_adsp2_sizes struct is 4 bytes longer, which can cause a buffer overflow, potentially leading to undefined behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of moderate severity because successful exploitation of this vulnerability would require elevated privileges to be able to access/modify the firmware loading mechanism. It also presents an elevated attack complexity given that the attacker requires knowledge of the Cirrus Logic DSP firmware to be able to craft special firmware to exploit the buffer overflow. Finally, depending on when the vulnerability is executed (ex. at boot time or during runtime) the impact on the system might change drastically; in one scenario it might cause a kernel crash in another just the audio driver might stop working.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41039"
},
{
"category": "external",
"summary": "RHBZ#2300408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41039"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Fix overflow checking of wmfw header"
},
{
"cve": "CVE-2024-41040",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300409"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the net/sshd tcf_ct_flow_table_process_conn of the Linux kernel. This flaw allows an attacker with a crafted payload to induce a system crash, resulting in a loss of system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/sched: Fix UAF when resolving a clash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41040"
},
{
"category": "external",
"summary": "RHBZ#2300409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41040"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/sched: Fix UAF when resolving a clash"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300410"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb-\u003edestructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet\u0027s apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe \u003c0f\u003e 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41041"
},
{
"category": "external",
"summary": "RHBZ#2300410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41041"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300414"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince \u0027ppp_async_encode()\u0027 assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add \u0027ppp_check_packet()\u0027 to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppp: reject claimed-as-LCP but actually malformed packets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41044"
},
{
"category": "external",
"summary": "RHBZ#2300414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300414"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41044"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppp: reject claimed-as-LCP but actually malformed packets"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300429"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms-\u003eusage\" to fix a race with section_deactivate() where\nms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference. We need to check its value before\ndereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41055"
},
{
"category": "external",
"summary": "RHBZ#2300429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41055"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()"
},
{
"cve": "CVE-2024-41056",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300430"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41056"
},
{
"category": "external",
"summary": "RHBZ#2300430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300430"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41056"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files"
},
{
"cve": "CVE-2024-41060",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300434"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va-\u003ebo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va-\u003ebo, so\nwe have to check it before dereferencing it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41060"
},
{
"category": "external",
"summary": "RHBZ#2300434",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300434"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41060"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/radeon: check bo_va-\u0026gt;bo is non-NULL before using it"
},
{
"cve": "CVE-2024-41064",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300439"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev-\u003epdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev-\u003epdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev-\u003epdev-\u003ebus.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc/eeh: avoid possible crash when edev-\u0026gt;pdev changes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Following issue marked as moderate with \"not affected or will not fix\" for Red Hat Enterprise Linux, as it is not vulnerable to this CVE. This is because the CVE does not impact the versions or configurations of the Linux kernel used in Red Hat\u0027s distributions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41064"
},
{
"category": "external",
"summary": "RHBZ#2300439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300439"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41064"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41064-6ecb@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41064-6ecb@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc/eeh: avoid possible crash when edev-\u0026gt;pdev changes"
},
{
"cve": "CVE-2024-41065",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300440"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n kernel BUG at mm/usercopy.c:102!\n Oops: Exception in kernel mode, sig: 5 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n REGS: c000000120c078c0 TRAP: 0700 Not tainted (6.10.0-rc3)\n MSR: 8000000000029033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 2828220f XER: 0000000e\n CFAR: c0000000001fdc80 IRQMASK: 0\n [ ... GPRs omitted ... ]\n NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n Call Trace:\n usercopy_abort+0x74/0xb0 (unreliable)\n __check_heap_object+0xf8/0x120\n check_heap_object+0x218/0x240\n __check_object_size+0x84/0x1a4\n dtl_file_read+0x17c/0x2c4\n full_proxy_read+0x8c/0x110\n vfs_read+0xdc/0x3a0\n ksys_read+0x84/0x144\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41065"
},
{
"category": "external",
"summary": "RHBZ#2300440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41065",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41065"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41065-2501@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41065-2501@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace"
},
{
"cve": "CVE-2024-41071",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300448"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds buffer overflow has been found in the Linux kernel\u2019s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41071"
},
{
"category": "external",
"summary": "RHBZ#2300448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300448"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41071"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "There are no mitigations for the flaw. Please update your system for fixes.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing"
},
{
"cve": "CVE-2024-41076",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the nfs4_set_security_label() in the Linux kernel, where the function fails to free the nfs_fattr attribute before exiting, leaving said memory allocation present. As the nfs4_set_security_label() is called repeatedly over time, this may lead to memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of low severity as the only effect of this vulnerability is to lead to memory leakage which, called repeatedly over time, may lead to memory exhaustion and impact the system\u0027s performance. Given that the max xattr size on NFSv4 systems is quite small (typically 1KB; and security xattrs tend to be significantly smaller) it is safe to assume that a system\u0027s availability being impacted solely from memory exhaustion caused by this vulnerability is unlikely and thus its impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41076"
},
{
"category": "external",
"summary": "RHBZ#2300453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NFSv4: Fix memory leak in nfs4_set_security_label"
},
{
"cve": "CVE-2024-41090",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299240"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tap: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41090"
},
{
"category": "external",
"summary": "RHBZ#2299240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tap: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41091",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2299336"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet, for example, size \u003c ETH_HLEN. The packet may traverse through vhost-net, macvtap, and vlan without any validation or drop. When this packet is presented to the mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always \u003e= ETH_HLEN.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: virtio-net: tun: mlx5_core short frame denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41091"
},
{
"category": "external",
"summary": "RHBZ#2299336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41091"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh",
"url": "https://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2024/07/24/4",
"url": "https://www.openwall.com/lists/oss-security/2024/07/24/4"
}
],
"release_date": "2024-07-24T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: virtio-net: tun: mlx5_core short frame denial of service"
},
{
"cve": "CVE-2024-41097",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300492"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41097"
},
{
"category": "external",
"summary": "RHBZ#2300492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41097"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()"
},
{
"cve": "CVE-2024-42084",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300533"
}
],
"notes": [
{
"category": "description",
"text": "An unexpected file truncate flaw was found when opening files with specific parameters in the Linux kernel\u0027s file-system. This vulnerability allows a local user to corrupt specific files when having access to these files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ftruncate: pass a signed offset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only occurs in compact mode on 64-bit architectures.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42084"
},
{
"category": "external",
"summary": "RHBZ#2300533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42084"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ftruncate: pass a signed offset"
},
{
"cve": "CVE-2024-42090",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300552"
}
],
"notes": [
{
"category": "description",
"text": "A deadlock flaw was found in the Linux kernel\u2019s pinctrl subsystem. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No known reproducer for this issue. It can happen due to some complex preconditions and in-error path handling.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42090"
},
{
"category": "external",
"summary": "RHBZ#2300552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42090"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER"
},
{
"cve": "CVE-2024-42094",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300709"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/iucv: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/iucv: Avoid explicit cpumask var allocation on stack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42094"
},
{
"category": "external",
"summary": "RHBZ#2300709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42094"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42094-135f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42094-135f@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net/iucv: Avoid explicit cpumask var allocation on stack"
},
{
"cve": "CVE-2024-42096",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2300713"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe \u0027profile_pc()\u0027 function is used for timer-based profiling, which\nisn\u0027t really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren\u0027t necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit\u0027s not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases. We\u0027ve lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn\u0027t any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here\u0027s some background commits relating to\nthis code from 2006:\n\n 0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n 31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86: stop playing stack games in profile_pc()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42096"
},
{
"category": "external",
"summary": "RHBZ#2300713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300713"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42096"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: x86: stop playing stack games in profile_pc()"
},
{
"cve": "CVE-2024-42114",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301477"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the cfg80211 component in the Linux kernel, where a lack of proper range validation applied to the NL80211_ATTR_TXQ_QUANTUM can lead to a scenario where the userspace passes an extremely high value that the kernel is not designed to handle efficiently (ex. 2^31). This can cause soft lockups and system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to effectively trigger this vulnerability require the user to be able to craft and send a Netlink message with the NL80211_ATTR_TXQ_QUANTUM parameter set to an abnormally high value. The permissions necessary to set this value would require CAP_NET_ADMIN.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42114"
},
{
"category": "external",
"summary": "RHBZ#2301477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301477"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42114"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42114"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values"
},
{
"cve": "CVE-2024-42124",
"cwe": {
"id": "CWE-372",
"name": "Incomplete Internal State Distinction"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301489"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42124"
},
{
"category": "external",
"summary": "RHBZ#2301489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42124"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible"
},
{
"cve": "CVE-2024-42131",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s memory management subsystem where a lack of proper size checks on dirty limits can lead to situations where large dirty limits end up being larger than 32-bits, resulting in potential overflows and divisions by 0. This can cause memory corruption, system instability, or crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: avoid overflows in dirty throttling logic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw is moderate severity because the privileges necessary to exploit this vulnerability are high, as it requires a user to have elevated permissions to set the dirty page limits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42131"
},
{
"category": "external",
"summary": "RHBZ#2301496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42131"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: avoid overflows in dirty throttling logic"
},
{
"cve": "CVE-2024-42152",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301519"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a possible leak when destroy a ctrl during qp establishment\n\nIn nvmet_sq_destroy we capture sq-\u003ectrl early and if it is non-NULL we\nknow that a ctrl was allocated (in the admin connect request handler)\nand we need to release pending AERs, clear ctrl-\u003esqs and sq-\u003ectrl\n(for nvme-loop primarily), and drop the final reference on the ctrl.\n\nHowever, a small window is possible where nvmet_sq_destroy starts (as\na result of the client giving up and disconnecting) concurrently with\nthe nvme admin connect cmd (which may be in an early stage). But *before*\nkill_and_confirm of sq-\u003eref (i.e. the admin connect managed to get an sq\nlive reference). In this case, sq-\u003ectrl was allocated however after it was\ncaptured in a local variable in nvmet_sq_destroy.\nThis prevented the final reference drop on the ctrl.\n\nSolve this by re-capturing the sq-\u003ectrl after all inflight request has\ncompleted, where for sure sq-\u003ectrl reference is final, and move forward\nbased on that.\n\nThis issue was observed in an environment with many hosts connecting\nmultiple ctrls simoutanuosly, creating a delay in allocating a ctrl\nleading up to this race window.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42152"
},
{
"category": "external",
"summary": "RHBZ#2301519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42152"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s tcp_metrics.c, where insufficient validation of the length of the source address for TCP metrics could lead to incorrect memory read (out of boundary read).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp_metrics: validate source addr length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact level is limited, because:\n1. Missed check existed before and worked correctly (because by default it worked for int32 value, even if it was not specified exactly).\n2. Even if for some specific case fail could happen, still it can lead only to incorrect memory read.\n3. Even if memory corruption happens, it should not lead to anything apart from incorrect tcp-ip statistics output to the local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42154"
},
{
"category": "external",
"summary": "RHBZ#2301522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42154"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp_metrics: validate source addr length"
},
{
"cve": "CVE-2024-42225",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301543"
}
],
"notes": [
{
"category": "description",
"text": "A potential flaw was found in the Linux kernel\u2019s MediaTek WiFi, where it was reusing uninitialized data. This flaw allows a local user to gain unauthorized access to some data potentially.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi: mt76: replace skb_put with skb_put_zero",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8.10 and later are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42225"
},
{
"category": "external",
"summary": "RHBZ#2301543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42225"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42225",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42225"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42225-bdfa@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42225-bdfa@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module mt76 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi: mt76: replace skb_put with skb_put_zero"
},
{
"cve": "CVE-2024-42226",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301544"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB\n\nSome transfer events don\u0027t always point to a TRB, and consequently don\u0027t\nhave a endpoint ring. In these cases, function handle_tx_event() should\nnot proceed, because if \u0027ep-\u003eskip\u0027 is set, the pointer to the endpoint\nring is used.\n\nTo prevent a potential failure and make the code logical, return after\nchecking the completion code for a Transfer event without TRBs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42226"
},
{
"category": "external",
"summary": "RHBZ#2301544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42226"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB"
},
{
"cve": "CVE-2024-42228",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"discovery_date": "2024-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303077"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s amdgpu driver in the amdgpu_vce_ring_parse_cs() function where the size variable is initialized with a pointer that may not be properly set before use. This issue could lead to unpredictable behavior in the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be of Moderate severity with a low impact on confidentiality given that the component primarily impacted by this vulnerability is an AMD GPU driver, which is used mainly for rendering graphics on the system. As such, a successful exploit of this vulnerability would likely not result in any sensitive information being leaked.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42228"
},
{
"category": "external",
"summary": "RHBZ#2303077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303077"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42228"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc"
},
{
"cve": "CVE-2024-42237",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303505"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Validate payload length before processing block\n\nMove the payload length check in cs_dsp_load() and cs_dsp_coeff_load()\nto be done before the block is processed.\n\nThe check that the length of a block payload does not exceed the number\nof remaining bytes in the firwmware file buffer was being done near the\nend of the loop iteration. However, some code before that check used the\nlength field without validating it.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Validate payload length before processing block",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42237"
},
{
"category": "external",
"summary": "RHBZ#2303505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42237"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42237"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: firmware: cs_dsp: Validate payload length before processing block"
},
{
"cve": "CVE-2024-42238",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303506"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. No error was returned from the cs_dsp_power_up() function if a block header is longer than the amount of data left in the file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: firmware: cs_dsp: Return error if block header overflows file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42238"
},
{
"category": "external",
"summary": "RHBZ#2303506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42238"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: firmware: cs_dsp: Return error if block header overflows file"
},
{
"cve": "CVE-2024-42240",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303508"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Linux kernel. When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set, then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler (exc_debug_kernel()) to issue a warning that results in a software crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42240"
},
{
"category": "external",
"summary": "RHBZ#2303508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42240"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation"
},
{
"cve": "CVE-2024-42246",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303514"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket\n\nWhen using a BPF program on kernel_connect(), the call can return -EPERM. This\ncauses xs_tcp_setup_socket() to loop forever, filling up the syslog and causing\nthe kernel to potentially freeze up.\n\nNeil suggested:\n\n This will propagate -EPERM up into other layers which might not be ready\n to handle it. It might be safer to map EPERM to an error we would be more\n likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.\n\nECONNREFUSED as error seems reasonable. For programs setting a different error\ncan be out of reach (see handling in 4fbac77d2d09) in particular on kernels\nwhich do not have f10d05966196 (\"bpf: Make BPF_PROG_RUN_ARRAY return -err\ninstead of allow boolean\"), thus given that it is better to simply remap for\nconsistent behavior. UDP does handle EPERM in xs_udp_send_request().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42246"
},
{
"category": "external",
"summary": "RHBZ#2303514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42246"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42246"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T"
}
],
"release_date": "2024-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket"
},
{
"cve": "CVE-2024-42265",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305410"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nprotect the fetch of -\u003efd[fd] in do_dup2() from mispredictions\n\nboth callers have verified that fd is not greater than -\u003emax_fds;\nhowever, misprediction might end up with\n tofree = fdt-\u003efd[fd];\nbeing speculatively executed. That\u0027s wrong for the same reasons\nwhy it\u0027s wrong in close_fd()/file_close_fd_locked(); the same\nsolution applies - array_index_nospec(fd, fdt-\u003emax_fds) could differ\nfrom fd only in case of speculative execution on mispredicted path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protect the fetch of -\u0026gt;fd[fd] in do_dup2() from mispredictions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42265"
},
{
"category": "external",
"summary": "RHBZ#2305410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305410"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42265"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T"
}
],
"release_date": "2024-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protect the fetch of -\u0026gt;fd[fd] in do_dup2() from mispredictions"
},
{
"cve": "CVE-2024-42322",
"discovery_date": "2024-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305467"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: properly dereference pe in ip_vs_add_service\n\nUse pe directly to resolve sparse warning:\n\n net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipvs: properly dereference pe in ip_vs_add_service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-42322"
},
{
"category": "external",
"summary": "RHBZ#2305467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2305467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42322"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T"
}
],
"release_date": "2024-08-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T02:39:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ipvs: properly dereference pe in ip_vs_add_service"
},
{
"cve": "CVE-2024-43830",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2305488"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: trigger: Unregister sysfs attributes before calling deactivate()\n\nTriggers which have trigger specific sysfs attributes typically store\nrelated data in trigger-data allocated by the activate() callback and\nfreed by the deactivate() callback.\n\nCalling device_remove_groups() after calling deactivate() leaves a window\nwhere the sysfs attributes show/store functions could be called after\ndeactivation and then operate on the just freed trigger-data.\n\nMove the device_remove_groups() call to before deactivate() to close\nthis race window.\n\nThis also makes the deactivation path properly do things in reverse order\nof the activation path which calls the activate() callback before calling\ndevice_add_groups().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: leds: trigger: Unregister sysfs attributes before calling deactivate()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-553.22.1.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-0:4.18.0-553.22.1.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:kernel-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-553.22.1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-553.22.1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-553.22.1.el8_10.x8